<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/industrial-cybersecurity-insider/" rel="self" type="application/rss+xml"/><title><![CDATA[Industrial Cybersecurity Insider]]></title><podcast:guid>cefa3d4e-9efa-52c2-92c5-3fe811b5f062</podcast:guid><lastBuildDate>Mon, 30 Mar 2026 20:55:35 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Industrial Cybersecurity Insider]]></copyright><managingEditor>Industrial Cybersecurity Insider</managingEditor><itunes:summary><![CDATA[Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!]]></itunes:summary><image><url>https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg</url><title>Industrial Cybersecurity Insider</title><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm]]></link></image><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><itunes:owner><itunes:name>Industrial Cybersecurity Insider</itunes:name></itunes:owner><itunes:author>Industrial Cybersecurity Insider</itunes:author><description>Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!</description><link>https://industrial-cybersecurity-insider.captivate.fm</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Everything You Need to Know to 'Get Safer Sooner']]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Business"><itunes:category text="Management"/></itunes:category><itunes:category text="News"><itunes:category text="Business News"/></itunes:category><itunes:category text="Technology"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>You Think Your Plant Is Secure. Your Data Says Otherwise.</title><itunes:title>You Think Your Plant Is Secure. Your Data Says Otherwise.</itunes:title><description><![CDATA[<p>Craig Duckworth sits down with CIO and Chief Enterprise Architect Shellie D'Angelo to address why so many OT and IT modernization efforts stall out at the foundation.</p><p>Shellie explains why data governance must come before “another tool,” how inconsistent data quality quietly sabotages reporting and risk decisions, and why leadership transparency is the fastest path to maturity. </p><p>Craig and Shellie also explore the reality of shadow IT on the plant floor, the growing impact of AI as both a defensive advantage and an attacker accelerator, and the practical steps teams can take to move from reactive chaos to measurable business outcomes.</p><p>Chapters:</p><ul><li>(00:00:00) Why honest risk conversations are the starting line</li><li>(00:01:00) Shellie’s background: rebuilding enterprise tech foundations</li><li>(00:02:00) OT/IT convergence: start with business drivers and data governance</li><li>(00:05:00) “Tools first” vs business-first security decisions</li><li>(00:08:00) Knowing what you have before buying more tools</li><li>(00:11:00) How far along are most organizations, really?</li><li>(00:15:00) AI as a double-edged sword: defense vs attacker acceleration</li><li>(00:18:00) Where to start: inventory first vs governance structure</li><li>(00:22:00) OT tech is often easier prey: PLCs, HMI/SCADA, cameras</li><li>(00:25:00) Partnering vs going it alone: don’t reinvent the wheel</li><li>(00:26:00) Tech debt and why technology can’t be an afterthought</li><li>(00:29:00) Governance should increase speed, not slow it down</li><li>(00:30:00) Final advice: “turn chaos into cash” and own your impact</li></ul><br/><p>Links And Resources:</p><ul><li>Shellie D'Angelo on <a href="https://www.linkedin.com/in/sdelany1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth sits down with CIO and Chief Enterprise Architect Shellie D'Angelo to address why so many OT and IT modernization efforts stall out at the foundation.</p><p>Shellie explains why data governance must come before “another tool,” how inconsistent data quality quietly sabotages reporting and risk decisions, and why leadership transparency is the fastest path to maturity. </p><p>Craig and Shellie also explore the reality of shadow IT on the plant floor, the growing impact of AI as both a defensive advantage and an attacker accelerator, and the practical steps teams can take to move from reactive chaos to measurable business outcomes.</p><p>Chapters:</p><ul><li>(00:00:00) Why honest risk conversations are the starting line</li><li>(00:01:00) Shellie’s background: rebuilding enterprise tech foundations</li><li>(00:02:00) OT/IT convergence: start with business drivers and data governance</li><li>(00:05:00) “Tools first” vs business-first security decisions</li><li>(00:08:00) Knowing what you have before buying more tools</li><li>(00:11:00) How far along are most organizations, really?</li><li>(00:15:00) AI as a double-edged sword: defense vs attacker acceleration</li><li>(00:18:00) Where to start: inventory first vs governance structure</li><li>(00:22:00) OT tech is often easier prey: PLCs, HMI/SCADA, cameras</li><li>(00:25:00) Partnering vs going it alone: don’t reinvent the wheel</li><li>(00:26:00) Tech debt and why technology can’t be an afterthought</li><li>(00:29:00) Governance should increase speed, not slow it down</li><li>(00:30:00) Final advice: “turn chaos into cash” and own your impact</li></ul><br/><p>Links And Resources:</p><ul><li>Shellie D'Angelo on <a href="https://www.linkedin.com/in/sdelany1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/you-think-your-plant-is-secure-your-data-says-otherwise]]></link><guid isPermaLink="false">c4f710bd-dfe8-4d6e-9d7a-6e9da403a3cd</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Mon, 30 Mar 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c4f710bd-dfe8-4d6e-9d7a-6e9da403a3cd.mp3" length="47570962" type="audio/mpeg"/><itunes:duration>33:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>119</itunes:episode><podcast:episode>119</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your OT Assets Are Invisible (And That&apos;s a Bigger Problem Than You Think)"><podcast:source uri="https://youtu.be/BuMFjbbpAEw"/></podcast:alternateEnclosure></item><item><title>Two Major Cybersecurity Shifts the Industry Isn&apos;t Prepared For with Simon Chassar</title><itunes:title>Two Major Cybersecurity Shifts the Industry Isn&apos;t Prepared For with Simon Chassar</itunes:title><description><![CDATA[<p>Dino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity. </p><p>Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation. </p><p>They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions. </p><p>Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments. </p><p>The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:02:00) - The Commoditization of OT Asset Visibility</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:00) - Two Major Industry Shifts: Right and Left</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - IT/OT Convergence and the Skills Gap Crisis</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:00) - Secure by Design and the AI Leapfrog</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:00) - M&amp;A Activity and Consolidation in OT Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:00) - The Rise of OT SOCs and MSP Partnerships</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi sits down with Simon Chassar, former Chief Revenue Officer at Claroty and current OT cybersecurity advisor and investor, to explore the evolution and future of industrial cybersecurity. </p><p>Simon shares insights from his decade-long journey in the space, discussing how OT asset visibility has become commoditized and why the industry is experiencing two major shifts: moving right toward threat-led SOC services and perimeter protection, and moving left toward secure-by-design approaches and attack simulation. </p><p>They dive into the persistent challenge of self-performing versus partnering with specialized integrators, the critical skills shortage commanding 30-40% salary premiums, and why AI is both accelerating security challenges and offering new solutions. </p><p>Simon reveals how private equity firms are finally prioritizing OT cybersecurity at the board level, discusses the emerging OT SOC landscape, and explains why the traditional IT security budget model is failing operational technology environments. </p><p>The conversation addresses the disconnect between IT leadership and the OT ecosystem, the proliferation of unmanaged remote access technologies, and the urgent need for manufacturers to engage their trusted system integrators and OEMs as cybersecurity partners before the next major incident occurs.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Meet Simon : From Claroty's Hypergrowth to OT Security's Next Chapter</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:02:00) - The Commoditization of OT Asset Visibility</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:00) - Two Major Industry Shifts: Right and Left</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - The Self-Performing Problem: Why OT Security Becomes Shelfware</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - IT/OT Convergence and the Skills Gap Crisis</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:00) - Secure by Design and the AI Leapfrog</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:15:00) - AI Uncovers Hidden OT Vulnerabilities and Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:18:00) - Funding Models and Private Equity's Cybersecurity Awakening</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - Why the OT Ecosystem Must Drive Its Own Security Strategy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:00) - M&amp;A Activity and Consolidation in OT Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:00) - The Rise of OT SOCs and MSP Partnerships</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/two-major-cybersecurity-shifts-the-industry-isnt-prepared-for-with-simon-chassar]]></link><guid isPermaLink="false">b07ac112-5a27-40d1-9714-6f3debee5629</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 24 Mar 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/b07ac112-5a27-40d1-9714-6f3debee5629.mp3" length="44789220" type="audio/mpeg"/><itunes:duration>31:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>118</itunes:episode><podcast:episode>118</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Two Major Cybersecurity Shifts the Industry Isn&apos;t Prepared For with Simon Chassar"><podcast:source uri="https://youtu.be/CrtJ8V-bA50"/></podcast:alternateEnclosure></item><item><title>The Connected Plant Floor: What S4X26 Revealed</title><itunes:title>The Connected Plant Floor: What S4X26 Revealed</itunes:title><description><![CDATA[<p>Craig and Dino recap their experience at S4X26, the leading global OT cybersecurity conference in Miami.</p><p>They discuss the conference's "connected" theme and how AI is creating an inflection point in industrial cybersecurity, driving unprecedented connectivity between IT and OT environments.</p><p>The hosts explore the challenges of the "silver tsunami" as experienced engineers retire, how AI-powered tools are being embedded directly into edge devices and industrial products from vendors like Cisco and Fortinet, and why the regulatory landscape in Europe is advancing faster than other regions.</p><p>They emphasize the importance of connecting with peers and partners in the OT security community, highlight key vendors and technologies showcased at the event, and explain why both IT and OT professionals should attend S4X together to bridge the knowledge gap.</p><p>The episode concludes with details about next year's expanded conference in Tampa, February 8-11.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Random Encounter with Team USA Hockey in Miami</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - S4X26 Conference Kickoff: The "Connected" Theme</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - AI as the Inflection Point for OT Connectivity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:00) - AI Embedded in Edge Devices and Vendor Technologies</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - First-Time Attendee Experiences and Key Takeaways</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - Europe's Cyber Resiliency Act and Regulatory Advancements</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:00) - Vendor Presence and the OT Technology Marketplace</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:14:00) - S4X27 Moving to Tampa: February 8-11, 2027</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - AI's Role in Addressing the Silver Tsunami</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:18:00) - Final Thoughts: Why IT and OT Teams Should Attend Together</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino recap their experience at S4X26, the leading global OT cybersecurity conference in Miami.</p><p>They discuss the conference's "connected" theme and how AI is creating an inflection point in industrial cybersecurity, driving unprecedented connectivity between IT and OT environments.</p><p>The hosts explore the challenges of the "silver tsunami" as experienced engineers retire, how AI-powered tools are being embedded directly into edge devices and industrial products from vendors like Cisco and Fortinet, and why the regulatory landscape in Europe is advancing faster than other regions.</p><p>They emphasize the importance of connecting with peers and partners in the OT security community, highlight key vendors and technologies showcased at the event, and explain why both IT and OT professionals should attend S4X together to bridge the knowledge gap.</p><p>The episode concludes with details about next year's expanded conference in Tampa, February 8-11.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Random Encounter with Team USA Hockey in Miami</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - S4X26 Conference Kickoff: The "Connected" Theme</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - AI as the Inflection Point for OT Connectivity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:00) - AI Embedded in Edge Devices and Vendor Technologies</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - First-Time Attendee Experiences and Key Takeaways</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - Europe's Cyber Resiliency Act and Regulatory Advancements</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:00) - Vendor Presence and the OT Technology Marketplace</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:14:00) - S4X27 Moving to Tampa: February 8-11, 2027</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - AI's Role in Addressing the Silver Tsunami</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:18:00) - Final Thoughts: Why IT and OT Teams Should Attend Together</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-connected-plant-floor-what-s4x26-revealed]]></link><guid isPermaLink="false">c6e21a3d-c726-4309-b92e-dc99074463fe</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Mon, 16 Mar 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c6e21a3d-c726-4309-b92e-dc99074463fe.mp3" length="29221722" type="audio/mpeg"/><itunes:duration>20:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>117</itunes:episode><podcast:episode>117</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Connected Plant Floor: What S4X26 Revealed"><podcast:source uri="https://youtu.be/T5nRCoyuZnU"/></podcast:alternateEnclosure></item><item><title>The Hidden Cost of Siloed OT Security Tools</title><itunes:title>The Hidden Cost of Siloed OT Security Tools</itunes:title><description><![CDATA[<p>As we look back, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.</p><p>They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.</p><p>The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.</p><p>They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.</p><p>The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The Data Sharing Problem in OT Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Why System Integrators Can't Access Security Tool Data</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:00) - Who's Keeping the Data and Why</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:00) - The IT/OT Oil and Water Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:00) - When System Integrators Bring Their Own Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:14:00) - Questions to Ask Your Cybersecurity Partners</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:00) - The Car Analogy: Buyers vs. Builders</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Who Asset Owners Really Trust</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:21:00) - The Three-Legged Stool of OT Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:23:00) - The Path to True IT/OT Convergence</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <u><a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <u><a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <u><a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><u><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <u><a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <u><a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <u><a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a></u>, <u><a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a></u>, and <u><a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a></u> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>As we look back, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the failure to share OT security tool data with the people who actually need it.</p><p>They explore why IT teams often purchase and deploy OT IDS platforms without engaging plant floor teams, system integrators, and OEMs who are actively working in manufacturing environments.</p><p>The conversation reveals that 85% of data collected by these tools is meant for OT teams to act on, yet it rarely reaches them.</p><p>They discuss the consequences of this siloed approach—including system integrators bringing their own tools to fill the gap—and provide practical advice on achieving true IT/OT convergence.</p><p>The episode emphasizes the importance of working with partners who can "build the car" rather than just "sell the car," and challenges organizations to evaluate whether they're truly practicing IT/OT convergence or just paying lip service to it.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The Data Sharing Problem in OT Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Why System Integrators Can't Access Security Tool Data</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:00) - Who's Keeping the Data and Why</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:00) - The IT/OT Oil and Water Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:00) - When System Integrators Bring Their Own Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:14:00) - Questions to Ask Your Cybersecurity Partners</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:00) - The Car Analogy: Buyers vs. Builders</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Who Asset Owners Really Trust</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:21:00) - The Three-Legged Stool of OT Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:23:00) - The Path to True IT/OT Convergence</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <u><a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <u><a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <u><a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><u><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <u><a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <u><a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <u><a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a></u>, <u><a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a></u>, and <u><a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a></u> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-hidden-cost-of-siloed-ot-security-tools]]></link><guid isPermaLink="false">a9d4dd15-efd8-4672-8d16-6b14444db4bc</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 11 Mar 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a9d4dd15-efd8-4672-8d16-6b14444db4bc.mp3" length="24154558" type="audio/mpeg"/><itunes:duration>25:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>116</itunes:episode><podcast:episode>116</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your Security Tools Are Useless Without This"><podcast:source uri="https://youtu.be/WQCF_k_7oOc"/></podcast:alternateEnclosure></item><item><title>The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook</title><itunes:title>The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook</itunes:title><description><![CDATA[<p>LuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers. </p><p>While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed. </p><p>They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises. </p><p>Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments. </p><p>The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP. </p><p>Chapters: </p><p>(00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report </p><p>(00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality </p><p>(00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments </p><p>(00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems </p><p>(00:09:00) - Third-Party and Supply Chain Security Gaps </p><p>(00:12:00) - Remote Access: The Hidden Attack Vector </p><p>(00:14:00) - Critical Supplier Dependencies and Decentralized OT </p><p>(00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce </p><p>(00:19:00) - The Shocking Truth About Incident Response Exercises </p><p>(00:22:00) - Real-World Impact: When Manufacturers Get Hit </p><p>(00:24:00) - Getting All Stakeholders in the Same Room </p><p>(00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents </p><p>(00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity? </p><p><strong>Links And Resources:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>LuRae Lumpkin, Producer of Industrial Cybersecurity Insider, sits down with industrial cybersecurity expert Dino Busalachi to break down the 2026 World Economic Forum Global Cybersecurity Outlook Report and what it really means for manufacturers. </p><p>While the report surveyed nearly a thousand CEOs, CIOs, and CISOs, Dino reveals a critical blind spot: industrial control systems and OT environments are being left dangerously exposed. </p><p>They discuss how AI is becoming a double-edged sword for attackers and defenders, why supply chain vulnerabilities remain unaddressed, the shocking lack of cybersecurity skills on plant floors, and why most companies still aren't conducting incident response exercises. </p><p>Dino shares real-world insights from working in nearly 2,000 plants over four decades, explaining why IT and OT remain disconnected, how remote access creates massive security gaps, and why outdated equipment with decades-old vulnerabilities sits unpatched in critical manufacturing environments. </p><p>The conversation reveals that while enterprises focus on IT security, the plant floor—where revenue is actually generated—remains critically vulnerable, with potentially catastrophic consequences for businesses, supply chains, and even national GDP. </p><p>Chapters: </p><p>(00:00:00) - Introduction and Overview of WEF 2026 Cybersecurity Report </p><p>(00:01:00) - Where Cybersecurity Funding Actually Goes: IT vs OT Reality </p><p>(00:03:00) - The Myth of Disconnected Legacy Equipment (00:05:00) - AI as a Double-Edged Sword in Industrial Environments </p><p>(00:08:00) - The Vulnerability Crisis: Thousands of Unpatched Systems </p><p>(00:09:00) - Third-Party and Supply Chain Security Gaps </p><p>(00:12:00) - Remote Access: The Hidden Attack Vector </p><p>(00:14:00) - Critical Supplier Dependencies and Decentralized OT </p><p>(00:15:00) - The Skills Gap: Why Industrial Cybersecurity Expertise is Scarce </p><p>(00:19:00) - The Shocking Truth About Incident Response Exercises </p><p>(00:22:00) - Real-World Impact: When Manufacturers Get Hit </p><p>(00:24:00) - Getting All Stakeholders in the Same Room </p><p>(00:28:00) - Insurance vs Prevention: The True Cost of Cyber Incidents </p><p>(00:29:00) - Final Thoughts: Who Should Own OT Cybersecurity? </p><p><strong>Links And Resources:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-blind-spots-putting-manufacturers-at-risk-wef-2026-global-cybersecurity-outlook]]></link><guid isPermaLink="false">04afa1b0-5262-4d07-b3eb-b4612e0b081b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Mon, 02 Mar 2026 16:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/04afa1b0-5262-4d07-b3eb-b4612e0b081b.mp3" length="60740446" type="audio/mpeg"/><itunes:duration>31:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>115</itunes:episode><podcast:episode>115</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Blind Spots Putting Manufacturers at Risk: WEF 2026 Global Cybersecurity Outlook"><podcast:source uri="https://youtu.be/MchUqo9c1U4"/></podcast:alternateEnclosure></item><item><title>IT SOC vs OT SOC How &amp; Why They’re Different</title><itunes:title>IT SOC vs OT SOC How &amp; Why They’re Different</itunes:title><description><![CDATA[<p>Craig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.</p><p>Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.</p><p>They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.</p><p>The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.</p><p>Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.</p><p>This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - The OT SOC Asset Visibility Problem: A Case Study</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - Why IT SOCs Can't Manage OT Assets</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:00) - Line Changeovers and Operational Context</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - First Responders and Incident Response Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - The WannaCry Response Gap</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:00) - Asset Inventory and Baseline Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:15:00) - Incident Response and Phone Trees</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:00) - Organizational Accountability Problems</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Greenfield Opportunities and Standardization</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - The IT-OT Collaboration Challenge</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:24:00) - Think Global, Act Local: Embedding IT in Plants</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino tackle the critical differences between IT and OT Security Operations Centers, revealing why traditional IT-centric SOCs are failing to protect manufacturing environments.</p><p>Drawing from real-world examples, including a global beverage company that discovered they were only monitoring one-third of their OT assets, the hosts expose the fundamental disconnect between IT security teams and operational technology environments.</p><p>They discuss why IT SOCs struggle with OT visibility, the challenges of asset inventory in dynamic manufacturing environments, and the critical importance of localization in security operations.</p><p>The conversation covers practical barriers like line changeovers, PLC modifications, remote access vulnerabilities, and the need for OT-specific incident response protocols.</p><p>Craig and Dino emphasize that effective OT security requires IT teams to become embedded in plant operations, working collaboratively with OEMs and system integrators, and understanding the unique operational context of manufacturing assets.</p><p>This episode is essential listening for CISOs, plant managers, and security professionals trying to bridge the IT-OT security gap.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The Two-Thirds Problem: When Your SOC Can't See Your Plant Floor</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - The OT SOC Asset Visibility Problem: A Case Study</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - Why IT SOCs Can't Manage OT Assets</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:00) - Line Changeovers and Operational Context</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - First Responders and Incident Response Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - The WannaCry Response Gap</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:00) - Asset Inventory and Baseline Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:15:00) - Incident Response and Phone Trees</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:00) - Organizational Accountability Problems</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Greenfield Opportunities and Standardization</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - The IT-OT Collaboration Challenge</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:24:00) - Think Global, Act Local: Embedding IT in Plants</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/it-soc-vs-ot-soc-how-why-theyre-different]]></link><guid isPermaLink="false">a6423a67-e0af-4669-a87e-679e4d69d0e6</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 25 Feb 2026 03:45:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a6423a67-e0af-4669-a87e-679e4d69d0e6.mp3" length="25225615" type="audio/mpeg"/><itunes:duration>26:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>114</itunes:episode><podcast:episode>114</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="OT Security Isn&apos;t the Same As IT Security: Here&apos;s What to Do About It"><podcast:source uri="https://youtu.be/V9BQZGUGDy4"/></podcast:alternateEnclosure></item><item><title>Your OT Cybersecurity Strategy Is Failing: Here&apos;s Why</title><itunes:title>Your OT Cybersecurity Strategy Is Failing: Here&apos;s Why</itunes:title><description><![CDATA[<p>Dino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.</p><p>They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.</p><p>The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.</p><p>They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.</p><p>The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.</p><p>Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.</p><p>They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.</p><p>With threats mounting, the time for action is now—not next quarter.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Welcome &amp; What We've Been Up To</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - The Shelfware Problem: When Security Tools Sit Unused</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:43) - Who Can Actually Patch Your Control Systems?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation &amp; Starting Small</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Why EDR Struggles in Control System Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:00) - Final Thoughts: The Time for Action Is Now</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino and Craig reunite to tackle the shifts occuring in industrial cybersecurity in 2026.</p><p>They discuss how OT-focused IDS software companies are shifting away from managed services to partner with systems integrators who understand the plant floor.</p><p>The conversation explores the challenges manufacturers face—from aging infrastructure spanning decades to flat layer-2 networks that give remote vendors unrestricted access.</p><p>They emphasize that IT departments cannot effectively manage OT assets they don't own or understand, especially when dealing with equipment older than their cybersecurity staff.</p><p>The episode covers the pitfalls of penetration testing in live manufacturing environments, the reality of shadow IT versus shadow OT, and why EDR solutions struggle in control system environments.</p><p>Dino and Craig stress the importance of treating cybersecurity as a marathon rather than a sprint, starting with basic asset inventory and microsegmentation.</p><p>They call on manufacturing leaders to stop deferring to IT for OT security, attend industry-specific conferences like S4X26, and partner with systems integrators who have deep automation expertise.</p><p>With threats mounting, the time for action is now—not next quarter.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Welcome &amp; What We've Been Up To</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:48) - The Big Shift: Why OT IDS Companies Are Backing Away From Managed Services</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - The Shelfware Problem: When Security Tools Sit Unused</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:12) - Why Pen Testing Can Be Disruptive (or Dangerous) in Manufacturing Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:54) - The Reality of Legacy Infrastructure: Equipment Older Than Your Cybersecurity Team</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:43) - Who Can Actually Patch Your Control Systems?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:09:04) - Supply Chain Vulnerabilities: You're Only as Strong as Your Weakest Link</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:01) - The Last Mile Challenge: Asset Inventory, Microsegmentation &amp; Starting Small</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:55) - The Shelfware to Tool-Switching Problem: Why Companies Are Reconsidering Their First Choice</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:18) - Shadow IT vs. Shadow OT: Who Really Owns Plant Floor Security?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Why EDR Struggles in Control System Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:21:35) - Time to Step Up: Why Manufacturing Leaders Can't Defer to IT Anymore</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:23:00) - Where to Learn: S4, Automation Fair, and Why You Need to Attend Industry Conferences</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:00) - Finding the Right Partner: Systems Integrators Who Speak Automation and Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:00) - Final Thoughts: The Time for Action Is Now</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/your-ot-cybersecurity-strategy-is-failing-heres-why]]></link><guid isPermaLink="false">5a3e2e40-3c25-4fbd-b900-faf91b341d86</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 17 Feb 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/5a3e2e40-3c25-4fbd-b900-faf91b341d86.mp3" length="28825490" type="audio/mpeg"/><itunes:duration>30:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>113</itunes:episode><podcast:episode>113</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your OT Cybersecurity Strategy Is Failing: Here&apos;s Why"><podcast:source uri="https://youtu.be/tu6tCDxSCvA"/></podcast:alternateEnclosure></item><item><title>Former NSA now Founder &amp; CTO Breaks Cybersecurity Down: Satellites to Manufacturing</title><itunes:title>Former NSA now Founder &amp; CTO Breaks Cybersecurity Down: Satellites to Manufacturing</itunes:title><description><![CDATA[<p>Dino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.</p><p>Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.</p><p>The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.</p><p>Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.</p><p>He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.</p><p>This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:32) - What is Proof Labs and Why Space Security Matters</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:35:20) - Real-World Applications for Remote Industrial Asset Protection</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dick Wilkinson on LinkedIn</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Proof Labs <a href="https://prooflabs.space" rel="noopener noreferrer" target="_blank">Website</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.</p><p>Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.</p><p>The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.</p><p>Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.</p><p>He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.</p><p>This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:32) - What is Proof Labs and Why Space Security Matters</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:35:20) - Real-World Applications for Remote Industrial Asset Protection</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dick Wilkinson on LinkedIn</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Proof Labs <a href="https://prooflabs.space" rel="noopener noreferrer" target="_blank">Website</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/former-nsa-now-founder-cto-breaks-cybersecurity-down-satellites-to-manufacturing]]></link><guid isPermaLink="false">d4237b8b-461e-4f2b-93f0-ef68f58a775b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 10 Feb 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d4237b8b-461e-4f2b-93f0-ef68f58a775b.mp3" length="48946476" type="audio/mpeg"/><itunes:duration>33:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>112</itunes:episode><podcast:episode>112</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Former Army NSA now Co-Founder &amp; CTO Breaks Cybersecurity Down: Satellites to Manufacturing"><podcast:source uri="https://youtu.be/T2Mk-8Mtr84"/></podcast:alternateEnclosure></item><item><title>The IT-OT Knowledge Gap Costing Organizations Millions</title><itunes:title>The IT-OT Knowledge Gap Costing Organizations Millions</itunes:title><description><![CDATA[<p>Dino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively. </p><p>The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia. </p><p>They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges. </p><p>AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation. </p><p>Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:48) - Career Journey: From IT to OT Cybersecurity Focus</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:02:48) - Books on AI Transforming Security Operations Centers</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:44) - The Implementation Gap: Challenges Building OT SOCs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:06:40) - The IT-OT Cultural Divide and Missing Communication</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - Can IT-OT Convergence Actually Happen?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - Market Consolidation: Who's Been Acquired in OT Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:18:40) - Third-Party Access Control and OEM Warranty Restrictions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT Anymore</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Adeel Shaikh Muhammad on <a href="https://www.linkedin.com/in/shadeel/?originalSubdomain=ae" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively. </p><p>The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia. </p><p>They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges. </p><p>AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation. </p><p>Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:48) - Career Journey: From IT to OT Cybersecurity Focus</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:02:48) - Books on AI Transforming Security Operations Centers</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:44) - The Implementation Gap: Challenges Building OT SOCs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:06:40) - The IT-OT Cultural Divide and Missing Communication</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - Can IT-OT Convergence Actually Happen?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - Market Consolidation: Who's Been Acquired in OT Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:18:40) - Third-Party Access Control and OEM Warranty Restrictions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT Anymore</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Adeel Shaikh Muhammad on <a href="https://www.linkedin.com/in/shadeel/?originalSubdomain=ae" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-it-ot-knowledge-gap-costing-organizations-millions]]></link><guid isPermaLink="false">777189f1-9400-4dd0-9f42-9d73386015b9</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 03 Feb 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/777189f1-9400-4dd0-9f42-9d73386015b9.mp3" length="21267552" type="audio/mpeg"/><itunes:duration>22:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>111</itunes:episode><podcast:episode>111</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The IT-OT Knowledge Gap Costing Organizations Millions"><podcast:source uri="https://youtu.be/eNIbE7_9o_Q"/></podcast:alternateEnclosure></item><item><title>The Patching Gap Putting Industrial Operations at Risk: IT vs OT</title><itunes:title>The Patching Gap Putting Industrial Operations at Risk: IT vs OT</itunes:title><description><![CDATA[<p>Craig and Dino tackle one of industrial cybersecurity's most critical challenges in this Rewind episode: the massive gap between IT and OT patching strategies. </p><p>IT organizations patch constantly—think Patch Tuesday. OT environments rarely patch at all, creating dangerous vulnerability gaps across connected networks. </p><p>The hosts explore why this disconnect exists. Production floor downtime costs are astronomical, making patching a risky business decision. </p><p>OEM restrictions complicate matters further. Many vendors won't support systems or warranties after unauthorized updates. </p><p>Managing decades-old equipment alongside modern systems creates another layer of complexity. Legacy PLCs weren't designed with patching in mind. </p><p>The consequences of not patching are mounting. Insurance companies are tightening requirements and regulatory pressures are intensifying. </p><p>Craig and Dino offer practical solutions that don't require shutting down production lines. Virtual patching technologies can protect legacy control systems without traditional software updates. </p><p>The hosts emphasize the urgent need for IT-OT collaboration. All stakeholders—including OEMs and system integrators—must be part of strategic cybersecurity conversations. </p><p>This episode is essential listening for CISOs, plant managers, and anyone responsible for protecting industrial operations. The connected world isn't waiting for OT to catch up. </p><p><strong>Chapters:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00:00 - Introduction to Patching Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:08 - IT vs OT Patching: Key Differences</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:02:55 - Understanding the Cost of Downtime in OT</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:03:32 - Overcoming Challenges with Legacy Systems</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:05:21 - Navigating OEMs and Safety Concerns</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:06:45 - The Role of Safety in OT Patching</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:08:52 - Exploring Virtual Patching Solutions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:13:11 - Enhancing Vendor Collaboration and Risk Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:18:33 - Addressing Insurance and Compliance Issues</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:20:12 - Significant Consequences of Not Patching</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:23:14 - Building an Effective Collaborative Cybersecurity Strategy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:24:03 - Conclusion and Actionable Insights</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <u><a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <u><a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <u><a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><u><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <u><a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <u><a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li></ol><br/><p><br></p><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <u><a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a></u>, <u><a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a></u>, and <a href="https://youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR&amp;si=JSnCtDgTGJlJL2uG" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino tackle one of industrial cybersecurity's most critical challenges in this Rewind episode: the massive gap between IT and OT patching strategies. </p><p>IT organizations patch constantly—think Patch Tuesday. OT environments rarely patch at all, creating dangerous vulnerability gaps across connected networks. </p><p>The hosts explore why this disconnect exists. Production floor downtime costs are astronomical, making patching a risky business decision. </p><p>OEM restrictions complicate matters further. Many vendors won't support systems or warranties after unauthorized updates. </p><p>Managing decades-old equipment alongside modern systems creates another layer of complexity. Legacy PLCs weren't designed with patching in mind. </p><p>The consequences of not patching are mounting. Insurance companies are tightening requirements and regulatory pressures are intensifying. </p><p>Craig and Dino offer practical solutions that don't require shutting down production lines. Virtual patching technologies can protect legacy control systems without traditional software updates. </p><p>The hosts emphasize the urgent need for IT-OT collaboration. All stakeholders—including OEMs and system integrators—must be part of strategic cybersecurity conversations. </p><p>This episode is essential listening for CISOs, plant managers, and anyone responsible for protecting industrial operations. The connected world isn't waiting for OT to catch up. </p><p><strong>Chapters:</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00:00 - Introduction to Patching Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:08 - IT vs OT Patching: Key Differences</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:02:55 - Understanding the Cost of Downtime in OT</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:03:32 - Overcoming Challenges with Legacy Systems</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:05:21 - Navigating OEMs and Safety Concerns</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:06:45 - The Role of Safety in OT Patching</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:08:52 - Exploring Virtual Patching Solutions</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:13:11 - Enhancing Vendor Collaboration and Risk Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:18:33 - Addressing Insurance and Compliance Issues</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:20:12 - Significant Consequences of Not Patching</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:23:14 - Building an Effective Collaborative Cybersecurity Strategy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:24:03 - Conclusion and Actionable Insights</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <u><a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <u><a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <u><a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><u><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <u><a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <u><a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></u></li></ol><br/><p><br></p><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <u><a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a></u>, <u><a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a></u>, and <a href="https://youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR&amp;si=JSnCtDgTGJlJL2uG" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-patching-gap-putting-industrial-operations-at-risk-it-vs-ot]]></link><guid isPermaLink="false">00366e9d-3d9c-4ace-8e69-8a9a2fd22791</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 27 Jan 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/00366e9d-3d9c-4ace-8e69-8a9a2fd22791.mp3" length="25353504" type="audio/mpeg"/><itunes:duration>26:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>110</itunes:episode><podcast:episode>110</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Patching Gap Putting Industrial Operations at Risk | IT vs OT"><podcast:source uri="https://youtu.be/EmU_HrvtaRg"/></podcast:alternateEnclosure></item><item><title>Four Distinct Companies &amp; One Critical Gap—The Ownership Crisis in OT Security</title><itunes:title>Four Distinct Companies &amp; One Critical Gap—The Ownership Crisis in OT Security</itunes:title><description><![CDATA[<p>This compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.</p><p>Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.</p><p>From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.</p><p>Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen.</p><p>Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Introduction: The Core Problem of Ownership in OT Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:45) - Why IT Security Approaches Fail on the Plant Floor</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:30) - The Cloud Analogy: Lessons for OT Implementation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:15) - The Missing Conversation: Capital Plans and OEMs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:20) - IT vs OT Networks: Different Purposes, Different Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:35) - EDR in OT: The Aftermarket Parts Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:10) - Cyber-Informed Engineering: Building Security into Design</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:45) - The Have and Have-Not World of Plant Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:23:20) - Left of Boom: Visibility Beyond Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:15) - Who Should Lead the OT Security Discussion</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://youtube.com/@industrialcybersecurityinsider?si=KQ8a3RjqJnPTcQ_L" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>This compilation episode brings together the most critical insights from Industrial Cybersecurity Insider conversations about the fundamental challenges plaguing OT security implementation and management.</p><p>Industry experts dissect why traditional IT security approaches fail catastrophically on the plant floor, revealing that the core issue isn't technology—it's ownership, collaboration, and understanding.</p><p>From the dangers of deploying endpoint detection without vendor qualification to the millions lost in unplanned downtime, this episode exposes the gap between security theory and operational reality.</p><p>Listeners will discover why cybersecurity tools are often shelfware, how the "have and have-not" world creates vulnerability gaps across manufacturing facilities, and what "left of boom" thinking means for preventing incidents before they happen.</p><p>Featuring hard-won lessons about shutdown windows, cyber-informed engineering, and the critical importance of building relationships between IT teams and plant floor operations, this episode delivers actionable intelligence for CISOs, plant managers, and anyone responsible for securing industrial control systems.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Introduction: The Core Problem of Ownership in OT Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:45) - Why IT Security Approaches Fail on the Plant Floor</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:30) - The Cloud Analogy: Lessons for OT Implementation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:15) - The Missing Conversation: Capital Plans and OEMs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:20) - IT vs OT Networks: Different Purposes, Different Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:35) - EDR in OT: The Aftermarket Parts Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:10) - Cyber-Informed Engineering: Building Security into Design</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:45) - The Have and Have-Not World of Plant Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:23:20) - Left of Boom: Visibility Beyond Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:27:15) - Who Should Lead the OT Security Discussion</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://youtube.com/@industrialcybersecurityinsider?si=KQ8a3RjqJnPTcQ_L" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/four-distinct-companies-one-critical-gapthe-ownership-crisis-in-ot-security]]></link><guid isPermaLink="false">30f0a93b-4333-4aa7-95aa-f0256ed88acd</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 20 Jan 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/30f0a93b-4333-4aa7-95aa-f0256ed88acd.mp3" length="43782294" type="audio/mpeg"/><itunes:duration>30:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>109</itunes:episode><podcast:episode>109</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Four Distinct Companies &amp; One Critical Gap—The Ownership Crisis in OT Security"><podcast:source uri="https://youtu.be/69b-OcgNPf0"/></podcast:alternateEnclosure></item><item><title>Your New Equipment Just Shipped With Security Risks &amp; Here&apos;s Why Your OEM Won&apos;t Fix Them</title><itunes:title>Your New Equipment Just Shipped With Security Risks &amp; Here&apos;s Why Your OEM Won&apos;t Fix Them</itunes:title><description><![CDATA[<p>In this episode, Dino and Craig tackle one of manufacturing's most pressing challenges: the OEM blockade. They explore why brand-new equipment often ships with hundreds of unpatched vulnerabilities, how the gap between IT and OT teams creates operational blind spots, and why manufacturers can't rely on traditional IT solutions to secure their plant floors.</p><p>From the CrowdStrike incident that took down HMIs to the "ghost in the machine" causing unexplained downtime, they reveal why OT teams must take ownership of their cybersecurity posture and build partnerships with the right ecosystem of OT-focused service providers.</p><p>If you've ever wondered why your million-dollar machine center is running Windows 7 or why your cybersecurity reports don't match reality, this episode provides the answers—and a path forward.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The OEM Blockade Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Understanding OEM Software Lock and Remote Access</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - The Reality of Unpatched Vulnerabilities in New Equipment</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:06:00) - The IT/OT Blockade and Convergence Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:09:00) - Why IT Disciplines Don't Translate to OT Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:00) - The CrowdStrike Incident: What Really Happened on Plant Floors</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:00) - The Lack of Due Diligence in Manufacturing M&amp;A</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - Chasing the Ghost in the Machine</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Process Integrity vs. Cybersecurity Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - Why OT Teams Must Take Ownership and Build the Right Partnerships</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino and Craig tackle one of manufacturing's most pressing challenges: the OEM blockade. They explore why brand-new equipment often ships with hundreds of unpatched vulnerabilities, how the gap between IT and OT teams creates operational blind spots, and why manufacturers can't rely on traditional IT solutions to secure their plant floors.</p><p>From the CrowdStrike incident that took down HMIs to the "ghost in the machine" causing unexplained downtime, they reveal why OT teams must take ownership of their cybersecurity posture and build partnerships with the right ecosystem of OT-focused service providers.</p><p>If you've ever wondered why your million-dollar machine center is running Windows 7 or why your cybersecurity reports don't match reality, this episode provides the answers—and a path forward.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The OEM Blockade Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Understanding OEM Software Lock and Remote Access</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - The Reality of Unpatched Vulnerabilities in New Equipment</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:06:00) - The IT/OT Blockade and Convergence Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:09:00) - Why IT Disciplines Don't Translate to OT Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:00) - The CrowdStrike Incident: What Really Happened on Plant Floors</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:00) - The Lack of Due Diligence in Manufacturing M&amp;A</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - Chasing the Ghost in the Machine</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - Process Integrity vs. Cybersecurity Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - Why OT Teams Must Take Ownership and Build the Right Partnerships</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/your-new-equipment-just-shipped-with-security-risks-heres-why-your-oem-wont-fix-them]]></link><guid isPermaLink="false">23577303-1a3c-482d-b8e3-9b74123693ed</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 13 Jan 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/23577303-1a3c-482d-b8e3-9b74123693ed.mp3" length="25735524" type="audio/mpeg"/><itunes:duration>26:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>108</itunes:episode><podcast:episode>108</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your New Equipment Just Shipped With Security Risks &amp; Why Your OEM Won&apos;t Fix Them"><podcast:source uri="https://youtu.be/xMkHyrew1Pw"/></podcast:alternateEnclosure></item><item><title>The CISO&apos;s Impossible Task: Protecting Plant Floors They&apos;ve Never Seen</title><itunes:title>The CISO&apos;s Impossible Task: Protecting Plant Floors They&apos;ve Never Seen</itunes:title><description><![CDATA[<p>Craig and Dino tackle one of the most pressing challenges in industrial cybersecurity: the disconnect between IT security teams and operational technology environments.</p><p>They explore why traditional CISOs struggle to protect manufacturing plants despite their best intentions, revealing that most security executives get 30 minutes or less per quarter to present cyber risks to their boards—leaving little time to address the complexities of OT environments they barely understand.</p><p>The conversation digs into the fundamental differences between enterprise IT and plant floor operations, where safety and uptime trump traditional security approaches, and where telling an engineer to remove a Windows 7 machine from the network might mean shutting down millions of dollars in production.</p><p>Craig and Dino make a compelling case for why external expertise, cross-functional collaboration, and a fundamental shift in how organizations approach industrial cybersecurity are not just recommended—they're essential for survival in an evolving threat landscape where adversaries only need to get lucky once.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The IT Security Mindset vs. OT Reality</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Has the CISO Really Engaged with Industrial Cybersecurity?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - The Disconnect: IT Owns the Network, OT Owns the Assets</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:00) - What CISOs Don't Know About the Plant Floor</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - Safety and Uptime: The Top Two Priorities CISOs Must Understand</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - The Asset Visibility Problem: Do You Really Know What's Out There?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:00) - 30 Minutes or Less Per Quarter: The CISO's Impossible Task</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - Why External Expertise Isn't Optional Anymore</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - The Cyber Insurance Myth: Why Your Policy Won't Save You</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - Secure by Demand: Holding Vendors Accountable</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:00) - Getting to the "Know": Where to Start and What to Ask</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino tackle one of the most pressing challenges in industrial cybersecurity: the disconnect between IT security teams and operational technology environments.</p><p>They explore why traditional CISOs struggle to protect manufacturing plants despite their best intentions, revealing that most security executives get 30 minutes or less per quarter to present cyber risks to their boards—leaving little time to address the complexities of OT environments they barely understand.</p><p>The conversation digs into the fundamental differences between enterprise IT and plant floor operations, where safety and uptime trump traditional security approaches, and where telling an engineer to remove a Windows 7 machine from the network might mean shutting down millions of dollars in production.</p><p>Craig and Dino make a compelling case for why external expertise, cross-functional collaboration, and a fundamental shift in how organizations approach industrial cybersecurity are not just recommended—they're essential for survival in an evolving threat landscape where adversaries only need to get lucky once.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The IT Security Mindset vs. OT Reality</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Has the CISO Really Engaged with Industrial Cybersecurity?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:00) - The Disconnect: IT Owns the Network, OT Owns the Assets</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:05:00) - What CISOs Don't Know About the Plant Floor</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:00) - Safety and Uptime: The Top Two Priorities CISOs Must Understand</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:00) - The Asset Visibility Problem: Do You Really Know What's Out There?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:00) - 30 Minutes or Less Per Quarter: The CISO's Impossible Task</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:16:00) - Why External Expertise Isn't Optional Anymore</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:19:00) - The Cyber Insurance Myth: Why Your Policy Won't Save You</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:00) - Secure by Demand: Holding Vendors Accountable</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:00) - Getting to the "Know": Where to Start and What to Ask</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-cisos-impossible-task-protecting-plant-floors-theyve-never-seen]]></link><guid isPermaLink="false">3e8269e5-aefc-4bc6-a164-f166576dd107</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 06 Jan 2026 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3e8269e5-aefc-4bc6-a164-f166576dd107.mp3" length="25381935" type="audio/mpeg"/><itunes:duration>26:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>107</itunes:episode><podcast:episode>107</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The CISO&apos;s Impossible Task: Protecting Plant Floors They&apos;ve Never Seen"><podcast:source uri="https://youtu.be/BoAPpSSwU0s"/></podcast:alternateEnclosure></item><item><title>IT and OT Are Still Siloed - Here&apos;s Why That&apos;s Dangerous</title><itunes:title>IT and OT Are Still Siloed - Here&apos;s Why That&apos;s Dangerous</itunes:title><description><![CDATA[<p>In this rewind episode, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the gap between IT teams deploying OT security tools and the plant floor teams who desperately need the data these tools collect.</p><p>They reveal why 85% of data from industrial cybersecurity platforms is meant for OT personnel, yet rarely reaches them.</p><p>The conversation exposes how organizations invest heavily in tools like IDS platforms but fail to share vulnerability data, asset inventories, and network intelligence with the system integrators, OEMs, and plant teams actually working on their control systems.</p><p>Craig and Dino discuss the consequences of this siloed approach—from incomplete asset visibility to duplicated tooling—and offer practical guidance on achieving true IT-OT convergence.</p><p>They emphasize that organizations must work with partners who can "build the car, not just buy it," and stress the importance of tabletop exercises, proper vendor vetting, and collaborative frameworks that include the entire industrial ecosystem in cybersecurity planning and execution.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The Growing Problem: OT Teams Lack Access to Critical Security Data</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:47) - IT-OT Convergence in Practice: Are We Really Doing It?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:42) - Why IT Teams Keep Security Data Siloed from Plant Floor Partners</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:06:38) - The Consequence: System Integrators Bring Their Own Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:38) - The Disconnect Between IT Security Tools and OT Reality</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:48) - How to Bridge the Gap: Questions System Integrators Should Ask</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:15:42) - Vetting Your Security Partners: Can They Build the Car or Just Buy It?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:46) - The Three-Legged Stool: Why IT-Only Security Fails in Manufacturing</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:20:48) - Action Steps: Creating a Comprehensive List of Your Industrial Ecosystem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:48) - Final Thoughts: Moving Beyond Security Theater to True Collaboration</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this rewind episode, Craig and Dino tackle a critical disconnect in industrial cybersecurity: the gap between IT teams deploying OT security tools and the plant floor teams who desperately need the data these tools collect.</p><p>They reveal why 85% of data from industrial cybersecurity platforms is meant for OT personnel, yet rarely reaches them.</p><p>The conversation exposes how organizations invest heavily in tools like IDS platforms but fail to share vulnerability data, asset inventories, and network intelligence with the system integrators, OEMs, and plant teams actually working on their control systems.</p><p>Craig and Dino discuss the consequences of this siloed approach—from incomplete asset visibility to duplicated tooling—and offer practical guidance on achieving true IT-OT convergence.</p><p>They emphasize that organizations must work with partners who can "build the car, not just buy it," and stress the importance of tabletop exercises, proper vendor vetting, and collaborative frameworks that include the entire industrial ecosystem in cybersecurity planning and execution.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - The Growing Problem: OT Teams Lack Access to Critical Security Data</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:47) - IT-OT Convergence in Practice: Are We Really Doing It?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:04:42) - Why IT Teams Keep Security Data Siloed from Plant Floor Partners</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:06:38) - The Consequence: System Integrators Bring Their Own Tools</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:08:38) - The Disconnect Between IT Security Tools and OT Reality</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:11:48) - How to Bridge the Gap: Questions System Integrators Should Ask</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:15:42) - Vetting Your Security Partners: Can They Build the Car or Just Buy It?</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:46) - The Three-Legged Stool: Why IT-Only Security Fails in Manufacturing</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:20:48) - Action Steps: Creating a Comprehensive List of Your Industrial Ecosystem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:22:48) - Final Thoughts: Moving Beyond Security Theater to True Collaboration</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/it-and-ot-are-still-siloed-heres-why-thats-dangerous]]></link><guid isPermaLink="false">c5ec6313-62b9-4ba7-bd35-11f16137fb51</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 30 Dec 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c5ec6313-62b9-4ba7-bd35-11f16137fb51.mp3" length="23401232" type="audio/mpeg"/><itunes:duration>24:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>106</itunes:episode><podcast:episode>106</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="IT and OT Are Still Siloed - Here&apos;s Why That&apos;s Dangerous"><podcast:source uri="https://youtu.be/97GnGXqOyUk"/></podcast:alternateEnclosure></item><item><title>The Hidden Reason Most Manufacturing Cybersecurity Programs Fail</title><itunes:title>The Hidden Reason Most Manufacturing Cybersecurity Programs Fail</itunes:title><description><![CDATA[<p>Dino sits down with cybersecurity expert Wil Klusovsky to discuss the massive gap between IT security practices and OT reality. With 26 years of experience, Wil shares his unconventional journey into operational technology and reveals why most security tools end up as shelfware on plant floors.</p><p>They dive deep into the communication breakdown between CISOs and plant operations, the critical role of system integrators and OEMs that IT leaders often ignore, and why the "air gap" myth continues to put manufacturing facilities at risk.</p><p>Wil breaks down his framework for speaking to boards in language they understand, emphasizing business impact over technical jargon. </p><p>The conversation covers everything from the challenges of MFA implementation in OT environments to why patching isn't always the answer. They discuss how organizations can build effective OT security programs by making cybersecurity everyone's responsibility - not just IT's problem.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Opening: The $50K Security Investment That Nobody Uses</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Will's Unconventional Journey Into OT Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:45) - The Communication Gap Between IT and OT Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:15) - Why Asset Visibility Tools Miss 135% of Your Equipment</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:30) - Speaking Board Language: Revenue Loss vs. Technical Jargon</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:25) - The Missing Third Leg: System Integrators and OEMs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:30) - Making Cybersecurity Everyone's Job, Not Just IT's Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:21:15) - Why Patching Isn't Always the Answer in OT Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:45) - The Reality Check: Physical Security in Manufacturing Plants</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:28:30) - Building a Cybersecurity Program as a Journey, Not a Destination</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wil Online <a href="https://www.wilklu.me/linktree" rel="noopener noreferrer" target="_blank">Linktree</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wil Klusovsky on <a href="https://www.linkedin.com/in/wilklu/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino sits down with cybersecurity expert Wil Klusovsky to discuss the massive gap between IT security practices and OT reality. With 26 years of experience, Wil shares his unconventional journey into operational technology and reveals why most security tools end up as shelfware on plant floors.</p><p>They dive deep into the communication breakdown between CISOs and plant operations, the critical role of system integrators and OEMs that IT leaders often ignore, and why the "air gap" myth continues to put manufacturing facilities at risk.</p><p>Wil breaks down his framework for speaking to boards in language they understand, emphasizing business impact over technical jargon. </p><p>The conversation covers everything from the challenges of MFA implementation in OT environments to why patching isn't always the answer. They discuss how organizations can build effective OT security programs by making cybersecurity everyone's responsibility - not just IT's problem.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:00:00) - Opening: The $50K Security Investment That Nobody Uses</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:01:00) - Will's Unconventional Journey Into OT Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:03:45) - The Communication Gap Between IT and OT Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:07:15) - Why Asset Visibility Tools Miss 135% of Your Equipment</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:10:30) - Speaking Board Language: Revenue Loss vs. Technical Jargon</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:13:25) - The Missing Third Leg: System Integrators and OEMs</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:17:30) - Making Cybersecurity Everyone's Job, Not Just IT's Problem</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:21:15) - Why Patching Isn't Always the Answer in OT Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:25:45) - The Reality Check: Physical Security in Manufacturing Plants</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>(00:28:30) - Building a Cybersecurity Program as a Journey, Not a Destination</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wil Online <a href="https://www.wilklu.me/linktree" rel="noopener noreferrer" target="_blank">Linktree</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Wil Klusovsky on <a href="https://www.linkedin.com/in/wilklu/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-hidden-reason-most-manufacturing-cybersecurity-programs-fail]]></link><guid isPermaLink="false">4110139f-6ef6-4b9c-baa7-ec551373a707</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 23 Dec 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4110139f-6ef6-4b9c-baa7-ec551373a707.mp3" length="29736665" type="audio/mpeg"/><itunes:duration>30:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>105</itunes:episode><podcast:episode>105</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Hidden Reason Most Manufacturing Cybersecurity Programs Fail"><podcast:source uri="https://youtu.be/ulk_mLcY9zE"/></podcast:alternateEnclosure></item><item><title>Why OT Must Lead the Manufacturing Cybersecurity Conversation</title><itunes:title>Why OT Must Lead the Manufacturing Cybersecurity Conversation</itunes:title><description><![CDATA[<p>Katie O'Brien shares her unconventional journey from music teacher to industrial cybersecurity expert, bringing over 25 years of IT experience into the OT world. </p><p>In this conversation with Dino, Katie discusses the critical gaps in OT cybersecurity—from the lack of university programs teaching industrial security to the disconnect between IT and OT teams. </p><p>They explore why system integrators and OEMs fail to design cybersecurity into new manufacturing projects from the start, compare it to building cars without safety features, and discuss the emergence of managed services in the OT space. </p><p>Katie explains how Garland Technology helps organizations get visibility into aging infrastructure with unmanaged switches, and both hosts emphasize the urgent need for the OT ecosystem to drive cybersecurity conversations proactively rather than waiting for IT teams who may never have walked the plant floor.</p><p>Chapters:</p><ul><li>(00:00:00) - The Hard Truths About OT Security Nobody Wants to Hear</li><li>(00:01:06) - Katie's Unconventional Journey: From Music Teacher to OT Cybersecurity Expert</li><li>(00:04:00) - The Current State of OT Cybersecurity and Future Directions</li><li>(00:06:00) - The Education Gap: Why Universities Aren't Teaching Industrial Cybersecurity</li><li>(00:08:00) - The Disconnect Between IT/Security Teams and OT Operations</li><li>(00:10:00) - Designing Cybersecurity Into New Manufacturing Projects From the Start</li><li>(00:13:00) - IT Teams Who've Never Walked the Plant Floor</li><li>(00:16:00) - The Emergence of Managed Services in the OT Space</li><li>(00:18:00) - Garland Technology: Getting Visibility Into Aging Infrastructure</li><li>(00:19:00) - Software Defined Automation and the Future of Industrial Control</li><li>(00:22:00) - Why the OT Ecosystem Must Drive the Cybersecurity Conversation</li><li>(00:24:00) - The Real Cost of Downtime and Cyber Incidents in Manufacturing</li></ul><br/><p>Links And Resources:</p><ul><li>Katie O'Brien on <a href="https://www.linkedin.com/in/katie-obrien-mba/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Katie O'Brien shares her unconventional journey from music teacher to industrial cybersecurity expert, bringing over 25 years of IT experience into the OT world. </p><p>In this conversation with Dino, Katie discusses the critical gaps in OT cybersecurity—from the lack of university programs teaching industrial security to the disconnect between IT and OT teams. </p><p>They explore why system integrators and OEMs fail to design cybersecurity into new manufacturing projects from the start, compare it to building cars without safety features, and discuss the emergence of managed services in the OT space. </p><p>Katie explains how Garland Technology helps organizations get visibility into aging infrastructure with unmanaged switches, and both hosts emphasize the urgent need for the OT ecosystem to drive cybersecurity conversations proactively rather than waiting for IT teams who may never have walked the plant floor.</p><p>Chapters:</p><ul><li>(00:00:00) - The Hard Truths About OT Security Nobody Wants to Hear</li><li>(00:01:06) - Katie's Unconventional Journey: From Music Teacher to OT Cybersecurity Expert</li><li>(00:04:00) - The Current State of OT Cybersecurity and Future Directions</li><li>(00:06:00) - The Education Gap: Why Universities Aren't Teaching Industrial Cybersecurity</li><li>(00:08:00) - The Disconnect Between IT/Security Teams and OT Operations</li><li>(00:10:00) - Designing Cybersecurity Into New Manufacturing Projects From the Start</li><li>(00:13:00) - IT Teams Who've Never Walked the Plant Floor</li><li>(00:16:00) - The Emergence of Managed Services in the OT Space</li><li>(00:18:00) - Garland Technology: Getting Visibility Into Aging Infrastructure</li><li>(00:19:00) - Software Defined Automation and the Future of Industrial Control</li><li>(00:22:00) - Why the OT Ecosystem Must Drive the Cybersecurity Conversation</li><li>(00:24:00) - The Real Cost of Downtime and Cyber Incidents in Manufacturing</li></ul><br/><p>Links And Resources:</p><ul><li>Katie O'Brien on <a href="https://www.linkedin.com/in/katie-obrien-mba/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/why-ot-must-lead-the-manufacturing-cybersecurity-conversation]]></link><guid isPermaLink="false">b8dc7ba0-9603-410c-8bd2-e7e04cba12d3</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 17 Dec 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/b8dc7ba0-9603-410c-8bd2-e7e04cba12d3.mp3" length="28914957" type="audio/mpeg"/><itunes:duration>30:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>104</itunes:episode><podcast:episode>104</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Disconnect Between IT and OT Nobody&apos;s Talking About"><podcast:source uri="https://youtu.be/oPAiU481a84"/></podcast:alternateEnclosure></item><item><title>How OT Managed Services Are Revolutionizing Industrial Cybersecurity</title><itunes:title>How OT Managed Services Are Revolutionizing Industrial Cybersecurity</itunes:title><description><![CDATA[<p>Dino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. </p><p>They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring talent is forcing a reckoning. </p><p>Kevin shares insights on building unified platforms that can manage everything from 30-year-old paper tape systems to AI-powered smart factories, why IT's "patch now" mentality fails in OT environments, and how the DG 360 platform is delivering true cyber-physical convergence today - not tomorrow. </p><p>They discuss the reality that most OT cybersecurity tools only discover 30% of plant assets, the importance of human-in-the-loop decision making, and why the OT ecosystem - not IT - must drive the managed services revolution. </p><p>This is a must-listen for anyone struggling with the complexity of protecting and managing modern manufacturing facilities.</p><p>Chapters:</p><ul><li>(00:00:00) - Introduction and Rockwell Automation Fair Recap</li><li>(00:01:43) - The OT Managed Services Evolution and Rebranding</li><li>(00:04:15) - The Three-Legged Stool: IT, OT, and OEMs</li><li>(00:07:32) - Point Solutions vs. Unified Platforms in Manufacturing</li><li>(00:10:45) - The DG 360 Vision: 360-Degree Plant Visibility</li><li>(00:14:28) - The Silver Tsunami and Training Challenges</li><li>(00:18:22) - Alert Fatigue and Actionable Intelligence</li><li>(00:22:45) - Software Defined Automation and Legacy Systems</li><li>(00:26:18) - Why OT Must Drive the Cybersecurity Conversation</li><li>(00:30:35) - Real-Time Demo and Implementation Readiness</li></ul><br/><p>Links And Resources:</p><ul><li>Kevin Kumpf on <a href="https://www.linkedin.com/in/kevin-kumpf-b5021412/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino sits down with industrial automation and industrial cybersecurity expert Kevin Kumpf, fresh off the floor of Rockwell Automation Fair 2025. </p><p>They discuss why OT managed services are finally becoming viable for manufacturing, the critical 80/20 split between people and technology challenges, and how the industry's "silver tsunami" of retiring talent is forcing a reckoning. </p><p>Kevin shares insights on building unified platforms that can manage everything from 30-year-old paper tape systems to AI-powered smart factories, why IT's "patch now" mentality fails in OT environments, and how the DG 360 platform is delivering true cyber-physical convergence today - not tomorrow. </p><p>They discuss the reality that most OT cybersecurity tools only discover 30% of plant assets, the importance of human-in-the-loop decision making, and why the OT ecosystem - not IT - must drive the managed services revolution. </p><p>This is a must-listen for anyone struggling with the complexity of protecting and managing modern manufacturing facilities.</p><p>Chapters:</p><ul><li>(00:00:00) - Introduction and Rockwell Automation Fair Recap</li><li>(00:01:43) - The OT Managed Services Evolution and Rebranding</li><li>(00:04:15) - The Three-Legged Stool: IT, OT, and OEMs</li><li>(00:07:32) - Point Solutions vs. Unified Platforms in Manufacturing</li><li>(00:10:45) - The DG 360 Vision: 360-Degree Plant Visibility</li><li>(00:14:28) - The Silver Tsunami and Training Challenges</li><li>(00:18:22) - Alert Fatigue and Actionable Intelligence</li><li>(00:22:45) - Software Defined Automation and Legacy Systems</li><li>(00:26:18) - Why OT Must Drive the Cybersecurity Conversation</li><li>(00:30:35) - Real-Time Demo and Implementation Readiness</li></ul><br/><p>Links And Resources:</p><ul><li>Kevin Kumpf on <a href="https://www.linkedin.com/in/kevin-kumpf-b5021412/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/how-ot-managed-services-are-revolutionizing-industrial-cybersecurity]]></link><guid isPermaLink="false">1d0e6dcf-3ef9-4350-a9e3-dc6844042d79</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 09 Dec 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1d0e6dcf-3ef9-4350-a9e3-dc6844042d79.mp3" length="32671141" type="audio/mpeg"/><itunes:duration>34:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>103</itunes:episode><podcast:episode>103</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="How OT Managed Services Are Revolutionizing Industrial Cybersecurity"><podcast:source uri="https://youtu.be/EjVqMUN8S7g"/></podcast:alternateEnclosure></item><item><title>Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets</title><itunes:title>Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets</itunes:title><description><![CDATA[<p>Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. </p><p>Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. </p><p>He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. </p><p>Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.</p><p>Chapters:</p><ul><li>(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks</li><li>(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web</li><li>(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom</li><li>(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime</li><li>(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?</li><li>(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence</li><li>(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night</li><li>(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency</li><li>(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification</li><li>(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business Context</li></ul><br/><p>Links And Resources:</p><ul><li>Richard LaTulip on <a href="https://www.linkedin.com/in/richard-latulip-5852606/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Richard's Book: <a href="https://www.amazon.com/Operation-Carder-Kaos-Penetrated-Underground/dp/1041077491" rel="noopener noreferrer" target="_blank">Operation Carder Kaos</a></li><li><a href="https://www.recordedfuture.com/?utm_campaign=gu_search_brand_NAM&amp;utm_term=recorded%20future_b&amp;utm_source=google&amp;utm_medium=cpc&amp;utm_content=776004685117&amp;hsa_ver=3&amp;hsa_acc=7443287029&amp;hsa_mt=b&amp;hsa_src=g&amp;hsa_cam=17935034817&amp;hsa_grp=182929515061&amp;hsa_tgt=kwd-20080406984&amp;hsa_kw=recorded%20future&amp;hsa_ad=776004685117&amp;hsa_net=adwords&amp;gad_source=1&amp;gad_campaignid=17935034817&amp;gbraid=0AAAAADvKpFRsr4GNUoZlRThV0gE0Xn5Nh&amp;gclid=Cj0KCQiAubrJBhCbARIsAHIdxD_yjAdfNk6mPyV4J_NTS4jKMkYs7O_HY3jnh91mV1ZLpTFC_QXOZAQaApn-EALw_wcB" rel="noopener noreferrer" target="_blank">Recorded Future</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. </p><p>Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail, how ransomware attacks actually cost organizations millions if not billions beyond the ransom payment itself, and why the timeline between compromise and detection has shrunk from months to minutes. </p><p>He shares jaw-dropping statistics on vulnerability management failures, explains how adversaries are using AI to become exponentially more dangerous, and provides actionable insights for building resilient security programs that protect what matters most to your business. </p><p>Whether you're defending critical infrastructure or managing security for a manufacturing organization, this conversation offers a rare insider perspective on the evolving threat landscape and what it takes to stay ahead of increasingly sophisticated cyber criminals.</p><p>Chapters:</p><ul><li>(00:00:00) - Meet the Ex-Secret Service Agent Who Infiltrated Underground Cyber Criminal Networks</li><li>(00:03:00) - Inside Operation Carder Kaos: Going Undercover in the Dark Web</li><li>(00:06:00) - The Real Price Tag: Why Ransomware Costs Go Far Beyond the Ransom</li><li>(00:11:00) - When Production Lines Go Dark: The Hidden Costs of Manufacturing Downtime</li><li>(00:14:00) - Reality Check: How Prepared Is Your Organization for a Cyber Attack?</li><li>(00:17:00) - The AI Arms Race: How Adversaries Are Weaponizing Artificial Intelligence</li><li>(00:21:00) - 2027 Threat Landscape: What Keeps a Field CISO Up at Night</li><li>(00:24:00) - Follow the Bitcoin: How Cyber Criminals Launder Billions Through Cryptocurrency</li><li>(00:31:00) - Why Speed Matters: The Critical Window for Law Enforcement Notification</li><li>(00:33:00) - The Security Leader's Playbook: Threat Intelligence + Business Context</li></ul><br/><p>Links And Resources:</p><ul><li>Richard LaTulip on <a href="https://www.linkedin.com/in/richard-latulip-5852606/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Richard's Book: <a href="https://www.amazon.com/Operation-Carder-Kaos-Penetrated-Underground/dp/1041077491" rel="noopener noreferrer" target="_blank">Operation Carder Kaos</a></li><li><a href="https://www.recordedfuture.com/?utm_campaign=gu_search_brand_NAM&amp;utm_term=recorded%20future_b&amp;utm_source=google&amp;utm_medium=cpc&amp;utm_content=776004685117&amp;hsa_ver=3&amp;hsa_acc=7443287029&amp;hsa_mt=b&amp;hsa_src=g&amp;hsa_cam=17935034817&amp;hsa_grp=182929515061&amp;hsa_tgt=kwd-20080406984&amp;hsa_kw=recorded%20future&amp;hsa_ad=776004685117&amp;hsa_net=adwords&amp;gad_source=1&amp;gad_campaignid=17935034817&amp;gbraid=0AAAAADvKpFRsr4GNUoZlRThV0gE0Xn5Nh&amp;gclid=Cj0KCQiAubrJBhCbARIsAHIdxD_yjAdfNk6mPyV4J_NTS4jKMkYs7O_HY3jnh91mV1ZLpTFC_QXOZAQaApn-EALw_wcB" rel="noopener noreferrer" target="_blank">Recorded Future</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/richard]]></link><guid isPermaLink="false">e2cbcd38-d8b5-4cd2-985d-ffaff76ace39</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 02 Dec 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e2cbcd38-d8b5-4cd2-985d-ffaff76ace39.mp3" length="36841115" type="audio/mpeg"/><itunes:duration>38:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>102</itunes:episode><podcast:episode>102</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Former U.S. Secret Service Agent Reveals Cyber Criminal Secrets"><podcast:source uri="https://youtu.be/Or75--YJp0o"/></podcast:alternateEnclosure></item><item><title>Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think</title><itunes:title>Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think</itunes:title><description><![CDATA[<p>In this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments.</p><p>They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control systems, the myth of isolated manufacturing equipment, and why 25% of companies still lack comprehensive OT asset monitoring. </p><p>Drawing powerful parallels to safety protocols, they explain why cybersecurity must become as ingrained in plant culture as wearing a hard hat on the factory floor.</p><p>Their bottom line: Back up your beliefs with data, treat every system as if it's connected, and verify, don't just trust, your security posture. In OT cybersecurity, perception isn't reality, and that gap could cost not only millions but also brand perception and even human life.</p><p>This episode is a must-listen for anyone serious about protecting their industrial environments.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?</li><li>00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?</li><li>00:01:45 - The Hidden Challenges Holding OT Security Back</li><li>00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security</li><li>00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?</li><li>00:06:15 - The Dangerous Myth of “Isolated” OT Systems</li><li>00:07:58 - From Theory to Action: Winning Strategies for OT Security</li><li>00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?</li><li>00:19:55 - No More Blind Spots: Key Takeaways for a Secure Future</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments.</p><p>They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control systems, the myth of isolated manufacturing equipment, and why 25% of companies still lack comprehensive OT asset monitoring. </p><p>Drawing powerful parallels to safety protocols, they explain why cybersecurity must become as ingrained in plant culture as wearing a hard hat on the factory floor.</p><p>Their bottom line: Back up your beliefs with data, treat every system as if it's connected, and verify, don't just trust, your security posture. In OT cybersecurity, perception isn't reality, and that gap could cost not only millions but also brand perception and even human life.</p><p>This episode is a must-listen for anyone serious about protecting their industrial environments.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?</li><li>00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?</li><li>00:01:45 - The Hidden Challenges Holding OT Security Back</li><li>00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security</li><li>00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?</li><li>00:06:15 - The Dangerous Myth of “Isolated” OT Systems</li><li>00:07:58 - From Theory to Action: Winning Strategies for OT Security</li><li>00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?</li><li>00:19:55 - No More Blind Spots: Key Takeaways for a Secure Future</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/why-your-plant-floor-might-not-be-as-secure-as-you-think]]></link><guid isPermaLink="false">7417cf59-6f25-4bad-a4f2-e4adfcfbb7eb</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 25 Nov 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/7417cf59-6f25-4bad-a4f2-e4adfcfbb7eb.mp3" length="21863305" type="audio/mpeg"/><itunes:duration>22:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>101</itunes:episode><podcast:episode>101</podcast:episode></item><item><title>The Silver Tsunami: Manufacturing&apos;s Talent and Knowledge Retirement Crisis</title><itunes:title>The Silver Tsunami: Manufacturing&apos;s Talent and Knowledge Retirement Crisis</itunes:title><description><![CDATA[<p>In this milestone 100th episode, Craig and Dino tackle the critical intersection of workforce retirement and industrial cybersecurity knowledge in manufacturing.</p><p>They explore how 82% of manufacturing workforce exits are due to retirement, creating a dangerous knowledge vacuum as decades of plant expertise walk out the door. </p><p>The conversation reveals why traditional IT security tools consistently miss 50-70% of OT assets, the problematic practice of buying equipment that's obsolete before installation, and why plant operators bypass corporate security policies when downtime costs a million dollars per day. </p><p>Craig and Dino state that the solution isn't just better tools, it's bridging the gap between centralized IT teams and the decentralized OT ecosystem by partnering with the system integrators and OEMs who actually keep plants running. </p><p>They discuss how manufacturers must choose between multi-million dollar capital investments in modern equipment or implementing proper network segmentation and security around legacy systems.</p><p>They address the reasons why the next generation of talent won't be attracted to facilities running decades-old technology.Chapters:</p><ul><li>(00:00:00) - Introduction and Industry Growth Update</li><li>(00:02:15) - The Silver Tsunami: 82% of Manufacturing Exits Are Retirements</li><li>(00:05:42) - Why IT Security Tools Miss 50-70% of OT Assets</li><li>(00:09:18) - The Knowledge Vacuum: What Happens When Experience Walks Out</li><li>(00:13:05) - Why Plant Operators Bypass Corporate Security Policies</li><li>(00:16:30) - The Problem with Buying Obsolete Equipment</li><li>(00:19:45) - Centralized IT vs Decentralized OT: Bridging the Gap</li><li>(00:23:20) - Building Partnerships with System Integrators and OEMs</li><li>(00:26:50) - Capital Investment vs Network Segmentation Strategy</li><li>(00:29:35) - Attracting Next-Gen Talent to Manufacturing Environments</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this milestone 100th episode, Craig and Dino tackle the critical intersection of workforce retirement and industrial cybersecurity knowledge in manufacturing.</p><p>They explore how 82% of manufacturing workforce exits are due to retirement, creating a dangerous knowledge vacuum as decades of plant expertise walk out the door. </p><p>The conversation reveals why traditional IT security tools consistently miss 50-70% of OT assets, the problematic practice of buying equipment that's obsolete before installation, and why plant operators bypass corporate security policies when downtime costs a million dollars per day. </p><p>Craig and Dino state that the solution isn't just better tools, it's bridging the gap between centralized IT teams and the decentralized OT ecosystem by partnering with the system integrators and OEMs who actually keep plants running. </p><p>They discuss how manufacturers must choose between multi-million dollar capital investments in modern equipment or implementing proper network segmentation and security around legacy systems.</p><p>They address the reasons why the next generation of talent won't be attracted to facilities running decades-old technology.Chapters:</p><ul><li>(00:00:00) - Introduction and Industry Growth Update</li><li>(00:02:15) - The Silver Tsunami: 82% of Manufacturing Exits Are Retirements</li><li>(00:05:42) - Why IT Security Tools Miss 50-70% of OT Assets</li><li>(00:09:18) - The Knowledge Vacuum: What Happens When Experience Walks Out</li><li>(00:13:05) - Why Plant Operators Bypass Corporate Security Policies</li><li>(00:16:30) - The Problem with Buying Obsolete Equipment</li><li>(00:19:45) - Centralized IT vs Decentralized OT: Bridging the Gap</li><li>(00:23:20) - Building Partnerships with System Integrators and OEMs</li><li>(00:26:50) - Capital Investment vs Network Segmentation Strategy</li><li>(00:29:35) - Attracting Next-Gen Talent to Manufacturing Environments</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-silver-tsunami-manufacturings-talent-and-knowledge-crisis]]></link><guid isPermaLink="false">4c6d9b9a-3e58-4cf4-a979-edd4d5d2f561</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 18 Nov 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4c6d9b9a-3e58-4cf4-a979-edd4d5d2f561.mp3" length="45108523" type="audio/mpeg"/><itunes:duration>31:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>100</itunes:episode><podcast:episode>100</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Silver Tsunami: Manufacturing&apos;s Talent and Knowledge Crisis"><podcast:source uri="https://youtu.be/Os_VqmM9iqs"/></podcast:alternateEnclosure></item><item><title>The Nation-State Attacks Hiding in Your OT Network</title><itunes:title>The Nation-State Attacks Hiding in Your OT Network</itunes:title><description><![CDATA[<p>In this episode of the Industrial Cybersecurity Insider, Craig Duckworth sits down with Matthew Carr, co-founder of Atumcell and OT penetration testing expert with fifteen years of experience securing operational technology systems. </p><p>Matthew shares his journey from vulnerability research to specializing in cyber-physical security, recounting the pivotal moment when his exploit code stopped a production line at a major car manufacturer. </p><p>The conversation addresses the critical gaps in OT security, including why most organizations are unaware of what's actually on their networks, the dangers of default passwords on IoT devices, and how attackers often use espionage rather than ransomware to remain undetected. </p><p>Matthew reveals how his team safely conducts pentests in production environments, develops proprietary detection rule sets, and helps organizations understand their infrastructure through network mapping. </p><p>The discussion encompasses a range of topics, from the risks associated with smart TVs in conference rooms to the motivations behind nation-states targeting critical infrastructure, culminating in practical advice on developing a cybersecurity roadmap for cyber-physical systems.</p><p>Chapters:</p><ul><li>(00:00:00) - Welcome and Introduction to Matthew Carr's OT Security Journey</li><li>(00:02:30) - The Moment Exploit Code Stopped a Production Line at a Major Car Manufacturer</li><li>(00:06:15) - Why Most Organizations Don't Know What's Actually on Their OT Networks</li><li>(00:09:45) - The Three Pillars of Adamzsel: Pentesting, Monitoring, and Tabletop Exercises</li><li>(00:14:20) - How Attackers Know Your Infrastructure Better Than You Do</li><li>(00:18:50) - Smart TVs in Conference Rooms: The Hidden Security Risk with Root Access</li><li>(00:22:30) - Espionage vs Ransomware: The Cyber Attacks No One Is Talking About</li><li>(00:26:45) - Why Default Passwords on IoT Devices Are an Attacker's Favorite Entry Point</li><li>(00:30:20) - Building a Cybersecurity Roadmap for Cyber-Physical Systems</li><li>(00:33:15) - Closing Thoughts and Free OT Security White Paper from Adamzsel</li></ul><br/><p>Links And Resources:</p><ul><li>Atumcell <a href="https://atumcell.com" rel="noopener noreferrer" target="_blank">Website</a></li><li>Matthew Carr on <a href="https://www.linkedin.com/in/sekuryti/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Industrial Cybersecurity Insider, Craig Duckworth sits down with Matthew Carr, co-founder of Atumcell and OT penetration testing expert with fifteen years of experience securing operational technology systems. </p><p>Matthew shares his journey from vulnerability research to specializing in cyber-physical security, recounting the pivotal moment when his exploit code stopped a production line at a major car manufacturer. </p><p>The conversation addresses the critical gaps in OT security, including why most organizations are unaware of what's actually on their networks, the dangers of default passwords on IoT devices, and how attackers often use espionage rather than ransomware to remain undetected. </p><p>Matthew reveals how his team safely conducts pentests in production environments, develops proprietary detection rule sets, and helps organizations understand their infrastructure through network mapping. </p><p>The discussion encompasses a range of topics, from the risks associated with smart TVs in conference rooms to the motivations behind nation-states targeting critical infrastructure, culminating in practical advice on developing a cybersecurity roadmap for cyber-physical systems.</p><p>Chapters:</p><ul><li>(00:00:00) - Welcome and Introduction to Matthew Carr's OT Security Journey</li><li>(00:02:30) - The Moment Exploit Code Stopped a Production Line at a Major Car Manufacturer</li><li>(00:06:15) - Why Most Organizations Don't Know What's Actually on Their OT Networks</li><li>(00:09:45) - The Three Pillars of Adamzsel: Pentesting, Monitoring, and Tabletop Exercises</li><li>(00:14:20) - How Attackers Know Your Infrastructure Better Than You Do</li><li>(00:18:50) - Smart TVs in Conference Rooms: The Hidden Security Risk with Root Access</li><li>(00:22:30) - Espionage vs Ransomware: The Cyber Attacks No One Is Talking About</li><li>(00:26:45) - Why Default Passwords on IoT Devices Are an Attacker's Favorite Entry Point</li><li>(00:30:20) - Building a Cybersecurity Roadmap for Cyber-Physical Systems</li><li>(00:33:15) - Closing Thoughts and Free OT Security White Paper from Adamzsel</li></ul><br/><p>Links And Resources:</p><ul><li>Atumcell <a href="https://atumcell.com" rel="noopener noreferrer" target="_blank">Website</a></li><li>Matthew Carr on <a href="https://www.linkedin.com/in/sekuryti/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-nation-state-attacks-hiding-in-your-ot-network]]></link><guid isPermaLink="false">037c33af-8a9d-4389-831d-d1685ace4411</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 12 Nov 2025 10:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/037c33af-8a9d-4389-831d-d1685ace4411.mp3" length="80575215" type="audio/mpeg"/><itunes:duration>33:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>99</itunes:episode><podcast:episode>99</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Nation-State Attacks Hiding in Your OT Network"><podcast:source uri="https://youtu.be/J7cpI6Pn2dY"/></podcast:alternateEnclosure></item><item><title>When IT Security Meets OT Reality: Why One Size Doesn&apos;t Fit All</title><itunes:title>When IT Security Meets OT Reality: Why One Size Doesn&apos;t Fit All</itunes:title><description><![CDATA[<p>What happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.</p><p>Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings. </p><p>Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.</p><p>If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.</p><p>Chapters:</p><ul><li>(00:00:00) - Introduction and Episode Overview</li><li>(00:01:19) - IT vs OT Security Mindsets</li><li>(00:02:03) - Zero Trust Challenges in OT Environments</li><li>(00:05:12) - Remote Access and Change Management Conflicts</li><li>(00:09:00) - Who Should Learn from Whom: IT or OT?</li><li>(00:10:23) - Asset Inventory: What OT Engineers Don't Know</li><li>(00:15:00) - Process Integrity and Operational Value</li><li>(00:21:57) - Shadow IT: The Backdoors Nobody Talks About</li><li>(00:26:00) - Designing Security Into New Equipment</li><li>(00:28:00) - Digital Safety vs Physical Safety</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>What happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.</p><p>Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings. </p><p>Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.</p><p>If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.</p><p>Chapters:</p><ul><li>(00:00:00) - Introduction and Episode Overview</li><li>(00:01:19) - IT vs OT Security Mindsets</li><li>(00:02:03) - Zero Trust Challenges in OT Environments</li><li>(00:05:12) - Remote Access and Change Management Conflicts</li><li>(00:09:00) - Who Should Learn from Whom: IT or OT?</li><li>(00:10:23) - Asset Inventory: What OT Engineers Don't Know</li><li>(00:15:00) - Process Integrity and Operational Value</li><li>(00:21:57) - Shadow IT: The Backdoors Nobody Talks About</li><li>(00:26:00) - Designing Security Into New Equipment</li><li>(00:28:00) - Digital Safety vs Physical Safety</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/when-it-security-meets-ot-reality-why-one-size-doesnt-fit-all]]></link><guid isPermaLink="false">bcaea3d9-9ebd-4eb7-bef7-6ac47bd4ff7e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 05 Nov 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/bcaea3d9-9ebd-4eb7-bef7-6ac47bd4ff7e.mp3" length="33827805" type="audio/mpeg"/><itunes:duration>35:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>98</itunes:episode><podcast:episode>98</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/6610901a-569b-417a-8e88-b508e75f62dc/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/6610901a-569b-417a-8e88-b508e75f62dc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/6610901a-569b-417a-8e88-b508e75f62dc/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="When IT Security Meets OT Reality: Why One Size Doesn&apos;t Fit All"><podcast:source uri="https://youtu.be/X_9J1UwApp8"/></podcast:alternateEnclosure></item><item><title>Dispelling IT/OT Convergence Challenges and Myths</title><itunes:title>Dispelling IT/OT Convergence Challenges and Myths</itunes:title><description><![CDATA[<p>In this episode, Craig and Dino tackle IT/OT convergence, operational technology security, and manufacturing cybersecurity challenges head-on. </p><p>They challenge the notion of OT being a "shadow IT group" and explore the fundamental differences between IT and OT operations in industrial environments. </p><p>The discussion emphasizes that OT focuses on safety and physical outcomes, while IT prioritizes data security. </p><p>They stress the importance of collaboration between IT and OT teams, highlighting how system integrators, OEMs, and plant operators must work together to improve cybersecurity posture. </p><p>The conversation covers practical issues like Overall Equipment Effectiveness (OEE), incident response, and the need for proper funding and governance. </p><p>Both advocate for CISOs and CIOs to actively engage with OT teams and system integrators, visit manufacturing facilities, and understand the unique challenges of industrial control systems to achieve true convergence and protect manufacturing plants and critical infrastructure.</p><p>Chapters:</p><ul><li>00:00:00 - Opening Shot: Who’s Really in Charge—CIOs or the Plant Floor?</li><li>00:00:57 - Collision Course: IT and OT Can’t Keep Dodging Each Other</li><li>00:01:52 - Two Worlds, One Mission: Why OT Isn’t Just “IT in a Hard Hat”</li><li>00:04:07 - When Convergence Fails: What’s Missing in the Middle</li><li>00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration</li><li>00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor</li><li>00:10:46 - OT’s Tipping Point: Will the Next Move Come from IT, or the Shop Floor?</li><li>00:17:32 - Your Move: What Leaders Must Do Next (Before It’s Too Late)</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Craig and Dino tackle IT/OT convergence, operational technology security, and manufacturing cybersecurity challenges head-on. </p><p>They challenge the notion of OT being a "shadow IT group" and explore the fundamental differences between IT and OT operations in industrial environments. </p><p>The discussion emphasizes that OT focuses on safety and physical outcomes, while IT prioritizes data security. </p><p>They stress the importance of collaboration between IT and OT teams, highlighting how system integrators, OEMs, and plant operators must work together to improve cybersecurity posture. </p><p>The conversation covers practical issues like Overall Equipment Effectiveness (OEE), incident response, and the need for proper funding and governance. </p><p>Both advocate for CISOs and CIOs to actively engage with OT teams and system integrators, visit manufacturing facilities, and understand the unique challenges of industrial control systems to achieve true convergence and protect manufacturing plants and critical infrastructure.</p><p>Chapters:</p><ul><li>00:00:00 - Opening Shot: Who’s Really in Charge—CIOs or the Plant Floor?</li><li>00:00:57 - Collision Course: IT and OT Can’t Keep Dodging Each Other</li><li>00:01:52 - Two Worlds, One Mission: Why OT Isn’t Just “IT in a Hard Hat”</li><li>00:04:07 - When Convergence Fails: What’s Missing in the Middle</li><li>00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration</li><li>00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor</li><li>00:10:46 - OT’s Tipping Point: Will the Next Move Come from IT, or the Shop Floor?</li><li>00:17:32 - Your Move: What Leaders Must Do Next (Before It’s Too Late)</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/dispelling-it-ot-convergence-challenges-and-myths]]></link><guid isPermaLink="false">c467b7cf-1437-43cb-a4f7-24fdf2ef3d4f</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 28 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/c467b7cf-1437-43cb-a4f7-24fdf2ef3d4f.mp3" length="53642970" type="audio/mpeg"/><itunes:duration>22:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>97</itunes:episode><podcast:episode>97</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Dispelling IT/OT Convergence Challenges and Myths"><podcast:source uri="https://youtu.be/mTkV5pvrHxU"/></podcast:alternateEnclosure></item><item><title>What Actually Works in OT Vulnerability Management with  Dan Cartmill, TXOne Networks</title><itunes:title>What Actually Works in OT Vulnerability Management with  Dan Cartmill, TXOne Networks</itunes:title><description><![CDATA[<p>In this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. </p><p>Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. The conversation explores why simply creating a list of vulnerabilities isn't enough – and what organizations should actually be doing to reduce risk in their OT environments.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction and Dan's Background</li><li>00:02:00 - Biggest Misconceptions About OT Vulnerability Management</li><li>00:04:00 - Blind Spots in OT Vulnerability Scanning</li><li>00:07:00 - Finding Vulnerabilities: OT vs IT Differences</li><li>00:10:00 - Proactive Approaches to Unknown Vulnerabilities</li><li>00:12:00 - How TX One Addresses Vulnerabilities Non-Disruptively</li><li>00:15:00 - Virtual Patching and Operations-First Philosophy</li><li>00:18:00 - IT/OT Convergence and Team Collaboration</li><li>00:21:00 - Building Relationships with Third-Party Partners</li><li>00:23:00 - Tabletop Exercises and Incident Response Planning</li><li>00:26:00 - Key Takeaway: Never Forget Your Original Objectives</li><li>00:28:00 - Dealing with Event Overload and Zero-Day Vulnerabilities</li></ul><br/><p>Links And Resources:</p><ul><li>Dan Cartmill on <a href="https://www.linkedin.com/in/dancartmill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.txone.com/" rel="noopener noreferrer" target="_blank">TXOne Networks</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. </p><p>Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. The conversation explores why simply creating a list of vulnerabilities isn't enough – and what organizations should actually be doing to reduce risk in their OT environments.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction and Dan's Background</li><li>00:02:00 - Biggest Misconceptions About OT Vulnerability Management</li><li>00:04:00 - Blind Spots in OT Vulnerability Scanning</li><li>00:07:00 - Finding Vulnerabilities: OT vs IT Differences</li><li>00:10:00 - Proactive Approaches to Unknown Vulnerabilities</li><li>00:12:00 - How TX One Addresses Vulnerabilities Non-Disruptively</li><li>00:15:00 - Virtual Patching and Operations-First Philosophy</li><li>00:18:00 - IT/OT Convergence and Team Collaboration</li><li>00:21:00 - Building Relationships with Third-Party Partners</li><li>00:23:00 - Tabletop Exercises and Incident Response Planning</li><li>00:26:00 - Key Takeaway: Never Forget Your Original Objectives</li><li>00:28:00 - Dealing with Event Overload and Zero-Day Vulnerabilities</li></ul><br/><p>Links And Resources:</p><ul><li>Dan Cartmill on <a href="https://www.linkedin.com/in/dancartmill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.txone.com/" rel="noopener noreferrer" target="_blank">TXOne Networks</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/what-actually-works-in-ot-vulnerability-management-with-dan-cartmill-txone-networks]]></link><guid isPermaLink="false">fb44172b-2b34-42d7-af3e-89e092856b0b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 21 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/fb44172b-2b34-42d7-af3e-89e092856b0b.mp3" length="37557956" type="audio/mpeg"/><itunes:duration>31:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>96</itunes:episode><podcast:episode>96</podcast:episode><podcast:transcript url="https://transcripts.captivate.fm/transcript/41854a9d-0b00-43b4-af49-43bb3a34a3eb/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/41854a9d-0b00-43b4-af49-43bb3a34a3eb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/41854a9d-0b00-43b4-af49-43bb3a34a3eb/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Cybersecurity OT Vulnerability Management Industry Secrets Revealed"><podcast:source uri="https://youtu.be/UAdKjI-F3N4"/></podcast:alternateEnclosure></item><item><title>Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention</title><itunes:title>Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention</itunes:title><description><![CDATA[<p>In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. </p><p>You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), practical ways to reduce alert fatigue and assign ownership, how to close the OT incident response gap by connecting SOC to operators, the realities of flat Layer 2 networks and undocumented zones, how to handle technical debt at scale (EOL firmware, unpatched HMIs, safe upgrade paths), and why "everyone is responsible" often means no one is. </p><p>Expect candid discussion on alert fatigue, flat networks, and the human constraints driving today's gaps, plus a concrete checklist for building a coalition that actually works to protect production environments.</p><p><strong>Chapters</strong></p><p>00:00:00 – Why incidents still happen after major OT cyber spend</p><p>00:02:30 – Tools vs. outcomes: underusing capabilities and alert fatigue</p><p>00:05:50 – Who owns plant‑floor cyber? Why CISOs, CIOs, OEMs, and SIs talk past each other</p><p>00:08:10 – Define the use case before tuning sensors and policies</p><p>00:10:00 – OT IR is missing: operators are the first responders</p><p>00:11:20 – Network reality check: flat L2, VLAN gaps, and unmanaged switches</p><p>00:13:30 – Change management and patching in OT: risk, downtime, and technical debt</p><p>00:15:20 – Skills and staffing: the silver tsunami and "jack of all trades" constraints</p><p>00:18:00 – What outside partners can and cannot do in plants</p><p>00:21:00 – Visibility blind spots: validating coverage with floor‑level walkthroughs</p><p>00:24:00 – It won’t stick without a coalition: getting plant managers, engineering, OEMs, and SOC aligned</p><p><strong>Links And Resources:</strong></p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. </p><p>You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), practical ways to reduce alert fatigue and assign ownership, how to close the OT incident response gap by connecting SOC to operators, the realities of flat Layer 2 networks and undocumented zones, how to handle technical debt at scale (EOL firmware, unpatched HMIs, safe upgrade paths), and why "everyone is responsible" often means no one is. </p><p>Expect candid discussion on alert fatigue, flat networks, and the human constraints driving today's gaps, plus a concrete checklist for building a coalition that actually works to protect production environments.</p><p><strong>Chapters</strong></p><p>00:00:00 – Why incidents still happen after major OT cyber spend</p><p>00:02:30 – Tools vs. outcomes: underusing capabilities and alert fatigue</p><p>00:05:50 – Who owns plant‑floor cyber? Why CISOs, CIOs, OEMs, and SIs talk past each other</p><p>00:08:10 – Define the use case before tuning sensors and policies</p><p>00:10:00 – OT IR is missing: operators are the first responders</p><p>00:11:20 – Network reality check: flat L2, VLAN gaps, and unmanaged switches</p><p>00:13:30 – Change management and patching in OT: risk, downtime, and technical debt</p><p>00:15:20 – Skills and staffing: the silver tsunami and "jack of all trades" constraints</p><p>00:18:00 – What outside partners can and cannot do in plants</p><p>00:21:00 – Visibility blind spots: validating coverage with floor‑level walkthroughs</p><p>00:24:00 – It won’t stick without a coalition: getting plant managers, engineering, OEMs, and SOC aligned</p><p><strong>Links And Resources:</strong></p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/industrial-cybersecurity-the-gap-between-investment-and-cyber-event-prevention]]></link><guid isPermaLink="false">3ec37ba7-9c94-47c1-a863-27d5f5f05797</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 14 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3ec37ba7-9c94-47c1-a863-27d5f5f05797.mp3" length="81363068" type="audio/mpeg"/><itunes:duration>33:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>95</itunes:episode><podcast:episode>95</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Why Manufacturing Plants Still Get Hacked Despite Cybersecurity Tool Investment"><podcast:source uri="https://youtu.be/KPVIas7pXHU"/></podcast:alternateEnclosure></item><item><title>Hidden Cybersecurity Vulnerabilities in Today’s Data Centers</title><itunes:title>Hidden Cybersecurity Vulnerabilities in Today’s Data Centers</itunes:title><description><![CDATA[<p>In this episode, Scott Cargill, Partner of BW Design Group, joins Craig and Dino. Together they dissect the critical vulnerability gap in data center operational technology infrastructure. </p><p>While most data centers implement robust IT security protocols, their building management systems controlling cooling, power distribution, and environmental controls remain significantly under-protected. </p><p>Cargill provides technical analysis of how the rapid expansion of data center capacity for AI workloads has outpaced OT security implementation, creating exploitable attack vectors where minutes of system compromise could cascade into millions in equipment damage and service disruption. </p><p>Through evidence-based examination and industry insights, this episode offers CISOs and OT security professionals a practical framework for addressing the IT-OT security convergence challenge in mission-critical facilities.</p><p>They offer actionable strategies for vulnerability assessment, segmentation, and defense-in-depth implementation.</p><h3>Chapters:</h3><p>- 00:00:00 - Meet Scott Cargill of BW Design Group</p><p>- 00:02:30 - Data centers expanding for AI</p><p>- 00:04:40 - Critical BMS vulnerabilities being ignored</p><p>- 00:07:40 - Alarming OT security reality</p><p>- 00:09:40 - Why OT security remains deprioritized</p><p>- 00:12:10 - IT-OT security convergence challenges persist</p><p>- 00:16:35 - Manufacturing parallels to data centers</p><p>- 00:20:10 - Security solutions evolution underway</p><p>- 00:21:45 - Managed services necessity for OT</p><p>- 00:24:42 - Thought leadership driving industry standards</p><h3>Links and Resources:</h3><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Scott Cargill on <a href="https://www.linkedin.com/in/scottcargill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Scott Cargill, Partner of BW Design Group, joins Craig and Dino. Together they dissect the critical vulnerability gap in data center operational technology infrastructure. </p><p>While most data centers implement robust IT security protocols, their building management systems controlling cooling, power distribution, and environmental controls remain significantly under-protected. </p><p>Cargill provides technical analysis of how the rapid expansion of data center capacity for AI workloads has outpaced OT security implementation, creating exploitable attack vectors where minutes of system compromise could cascade into millions in equipment damage and service disruption. </p><p>Through evidence-based examination and industry insights, this episode offers CISOs and OT security professionals a practical framework for addressing the IT-OT security convergence challenge in mission-critical facilities.</p><p>They offer actionable strategies for vulnerability assessment, segmentation, and defense-in-depth implementation.</p><h3>Chapters:</h3><p>- 00:00:00 - Meet Scott Cargill of BW Design Group</p><p>- 00:02:30 - Data centers expanding for AI</p><p>- 00:04:40 - Critical BMS vulnerabilities being ignored</p><p>- 00:07:40 - Alarming OT security reality</p><p>- 00:09:40 - Why OT security remains deprioritized</p><p>- 00:12:10 - IT-OT security convergence challenges persist</p><p>- 00:16:35 - Manufacturing parallels to data centers</p><p>- 00:20:10 - Security solutions evolution underway</p><p>- 00:21:45 - Managed services necessity for OT</p><p>- 00:24:42 - Thought leadership driving industry standards</p><h3>Links and Resources:</h3><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Scott Cargill on <a href="https://www.linkedin.com/in/scottcargill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/hidden-cybersecurity-vulnerabilities-in-todays-data-centers]]></link><guid isPermaLink="false">1d418cc6-e039-4db2-9e0e-9ec467ae4169</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Mon, 06 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1d418cc6-e039-4db2-9e0e-9ec467ae4169.mp3" length="32385324" type="audio/mpeg"/><itunes:duration>26:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>94</itunes:episode><podcast:episode>94</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Hidden Cybersecurity Vulnerabilities in Today’s Modern Data Centers"><podcast:source uri="https://youtu.be/nl-TirBrSG0"/></podcast:alternateEnclosure></item><item><title>Building OT Cybersecurity That Works in the Real World</title><itunes:title>Building OT Cybersecurity That Works in the Real World</itunes:title><description><![CDATA[<p>Industrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. </p><p>In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must come before capabilities, how to right-size your technology stack through tool rationalization, and why interdependence mapping is foundational for real resilience.</p><ul><li>00:00:00 – Why OT maturity often stalls</li><li>00:06:00 – Where to focus first: assets, segmentation, and access</li><li>00:08:20 – Governance gaps: frameworks on paper vs. controls in practice</li><li>00:10:10 – Interdependence mapping beyond "crown jewels"</li><li>00:12:30 – Operators as first responders and safe-state realities</li><li>00:16:15 – Vendor and OEM ecosystems: who owns the response plan?</li><li>00:20:10 – Threat intel's limits: effects‑based security over means‑based noise</li><li>00:22:00 – Incident readiness in plants: plans, practice, and ownership</li><li>00:26:00 – Supply chain fragility and concentration risk in manufacturing</li><li>00:29:30 – Tool rationalization: measuring ROI, coverage, and usability</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>DJ's Blog on Interdependence Mapping: <a href="https://claroty.com/blog" rel="noopener noreferrer" target="_blank">https://claroty.com/blog</a></li><li>Danielle Jablanski on <a href="https://www.linkedin.com/in/daniellejjablanski/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Industrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. </p><p>In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must come before capabilities, how to right-size your technology stack through tool rationalization, and why interdependence mapping is foundational for real resilience.</p><ul><li>00:00:00 – Why OT maturity often stalls</li><li>00:06:00 – Where to focus first: assets, segmentation, and access</li><li>00:08:20 – Governance gaps: frameworks on paper vs. controls in practice</li><li>00:10:10 – Interdependence mapping beyond "crown jewels"</li><li>00:12:30 – Operators as first responders and safe-state realities</li><li>00:16:15 – Vendor and OEM ecosystems: who owns the response plan?</li><li>00:20:10 – Threat intel's limits: effects‑based security over means‑based noise</li><li>00:22:00 – Incident readiness in plants: plans, practice, and ownership</li><li>00:26:00 – Supply chain fragility and concentration risk in manufacturing</li><li>00:29:30 – Tool rationalization: measuring ROI, coverage, and usability</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>DJ's Blog on Interdependence Mapping: <a href="https://claroty.com/blog" rel="noopener noreferrer" target="_blank">https://claroty.com/blog</a></li><li>Danielle Jablanski on <a href="https://www.linkedin.com/in/daniellejjablanski/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/building-ot-cybersecurity-that-works-in-the-real-world]]></link><guid isPermaLink="false">57e0340c-8fa4-40e5-a386-af56ca67c2cd</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 30 Sep 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/57e0340c-8fa4-40e5-a386-af56ca67c2cd.mp3" length="36250119" type="audio/mpeg"/><itunes:duration>37:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>93</itunes:episode><podcast:episode>93</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Industrial Cybersecurity INSIDER Reveals Top Security Strategies"><podcast:source uri="https://youtu.be/sQH2XFmzZ-k"/></podcast:alternateEnclosure></item><item><title>Mitsubishi’s Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition</title><itunes:title>Mitsubishi’s Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition</itunes:title><description><![CDATA[<p>Hosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market.</p><p>The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-making. </p><p>Craig and Dino share practical insights for security leaders and engineering professionals working in industrial environments.</p><p>Topics covered: </p><p>• Why Mitsubishi made this $1B investment </p><p>• How this affects choosing security vendors </p><p>• The growing role of managed services in OT security </p><p>• What organizations should do to prepare for changes</p><p>For cybersecurity professionals, industrial engineers, and executives working with operational technology and cyber defense.</p><p>Chapters:</p><ul><li><strong>00:00:00</strong>&nbsp;- Welcome to Industrial Cybersecurity Insider Podcast</li><li><strong>00:01:26</strong>&nbsp;- A Trend of Cybersecurity Platform Acquisitions</li><li><strong>00:02:03</strong>&nbsp;- The "Cyber-Informed Engineering" Play</li><li><strong>00:02:52</strong>&nbsp;- Market Impact: Setting a Billion-Dollar Bar for Competitors</li><li><strong>00:05:06</strong>&nbsp;- A Lack of Expertise and Resources</li><li><strong>00:05:48</strong>&nbsp;- The Challenge of Building an In-House Team vs. Using Managed Services</li><li><strong>00:07:40</strong>&nbsp;- Embedding Security Directly into Hardware Controllers</li><li><strong>00:09:33</strong>&nbsp;- How Competitors Like Rockwell Might React</li><li><strong>00:10:00</strong>&nbsp;- IPO or Acquisition?</li><li><strong>00:14:42</strong>&nbsp;- The On-Prem vs. Cloud Debate in Manufacturing Environments</li><li><strong>00:16:50</strong>&nbsp;- 87% of Organizations Are Lagging in Cybersecurity Maturity</li><li><strong>00:17:20</strong>&nbsp;- The IT/OT Resource and Knowledge Gap</li><li><strong>00:18:54</strong>&nbsp;- The Need for CIOs to Partner with OT Systems Integrators</li><li><strong>00:21:25</strong>&nbsp;- The "OnStar" Model for Industrial Security</li><li><strong>00:22:15</strong>&nbsp;- The Reality of Vendor Lock-In and Warranty Issues</li><li><strong>00:24:14</strong>&nbsp;- OT Needs to Own Its Cybersecurity Strategy</li><li><strong>00:25:12</strong>&nbsp;- The Risk of Underutilized Security Tools</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Hosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market.</p><p>The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-making. </p><p>Craig and Dino share practical insights for security leaders and engineering professionals working in industrial environments.</p><p>Topics covered: </p><p>• Why Mitsubishi made this $1B investment </p><p>• How this affects choosing security vendors </p><p>• The growing role of managed services in OT security </p><p>• What organizations should do to prepare for changes</p><p>For cybersecurity professionals, industrial engineers, and executives working with operational technology and cyber defense.</p><p>Chapters:</p><ul><li><strong>00:00:00</strong>&nbsp;- Welcome to Industrial Cybersecurity Insider Podcast</li><li><strong>00:01:26</strong>&nbsp;- A Trend of Cybersecurity Platform Acquisitions</li><li><strong>00:02:03</strong>&nbsp;- The "Cyber-Informed Engineering" Play</li><li><strong>00:02:52</strong>&nbsp;- Market Impact: Setting a Billion-Dollar Bar for Competitors</li><li><strong>00:05:06</strong>&nbsp;- A Lack of Expertise and Resources</li><li><strong>00:05:48</strong>&nbsp;- The Challenge of Building an In-House Team vs. Using Managed Services</li><li><strong>00:07:40</strong>&nbsp;- Embedding Security Directly into Hardware Controllers</li><li><strong>00:09:33</strong>&nbsp;- How Competitors Like Rockwell Might React</li><li><strong>00:10:00</strong>&nbsp;- IPO or Acquisition?</li><li><strong>00:14:42</strong>&nbsp;- The On-Prem vs. Cloud Debate in Manufacturing Environments</li><li><strong>00:16:50</strong>&nbsp;- 87% of Organizations Are Lagging in Cybersecurity Maturity</li><li><strong>00:17:20</strong>&nbsp;- The IT/OT Resource and Knowledge Gap</li><li><strong>00:18:54</strong>&nbsp;- The Need for CIOs to Partner with OT Systems Integrators</li><li><strong>00:21:25</strong>&nbsp;- The "OnStar" Model for Industrial Security</li><li><strong>00:22:15</strong>&nbsp;- The Reality of Vendor Lock-In and Warranty Issues</li><li><strong>00:24:14</strong>&nbsp;- OT Needs to Own Its Cybersecurity Strategy</li><li><strong>00:25:12</strong>&nbsp;- The Risk of Underutilized Security Tools</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/mitsubishis-billion-dollar-bet-on-ot-cybersecurity-with-nozomi-acquisition]]></link><guid isPermaLink="false">f6cabbd2-ef2a-4e0e-bf90-f73eaa37b900</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 23 Sep 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/f6cabbd2-ef2a-4e0e-bf90-f73eaa37b900.mp3" length="25420403" type="audio/mpeg"/><itunes:duration>26:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>92</itunes:episode><podcast:episode>92</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Why Manufacturing Plants Still Get Hacked Despite Cybersecurity Tool Investment"><podcast:source uri="https://youtu.be/KPVIas7pXHU"/></podcast:alternateEnclosure></item><item><title>Responsibility Without Authority: The CISO&apos;s Industrial Cybersecurity Dilemma</title><itunes:title>Responsibility Without Authority: The CISO&apos;s Industrial Cybersecurity Dilemma</itunes:title><description><![CDATA[<p>In this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. </p><p>While executives are tasked with ensuring resilience and reporting to the board, they often hit resistance at the plant floor where production uptime and safety KPIs take priority. </p><p>The conversation explores IT/OT convergence, asset visibility blind spots, OEM restrictions, and the risks of relying on remote-only deployments. </p><p>With insights from decades of hands-on experience in industrial environments, Craig and Dino outline practical steps for building bridges between IT and OT, aligning financial risk with security strategy, and equipping CISOs with the authority they need to succeed.</p><h2>Chapters:</h2><ul><li>00:00:00 - Welcome to the Industrial Cybersecurity Insider Podcast</li><li>00:01:11 - The CISO's Core Conflict of Responsibility Without Authority</li><li>00:02:45 - Why Security Efforts Get "Kneecapped at the Front Door"</li><li>00:04:04 - Understanding the OT Environment and Its Unique Technology</li><li>00:05:36 - Building Bridges Between IT and OT as the Solution</li><li>00:07:44 - Overcoming OT's "Skittish" Resistance to IT</li><li>00:09:43 - The Scaling Problem of Too Few Engineers for Too Many Plants</li><li>00:10:57 - Why a Remote-First Approach Fails in Manufacturing</li><li>00:14:44 - The "Epiphany" of Uncovering Operational Benefits for OT Teams</li><li>00:17:24 - Navigating OEM Warranties and Equipment Restrictions</li><li>00:19:14 - The "Trust but Verify" Mandate for a CISO</li><li>00:20:56 - The Danger of Hidden Networks and the "Air Gap" Myth</li><li>00:23:16 - Speaking the Language of Business in Dollars and Cents</li><li>00:24:43 - Aligning Security with the Plant's Capital Master Plan</li><li>00:27:24 - How Company Ownership Affects Security Investment</li><li>00:28:16 - How to Give the CISO Real Authority</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. </p><p>While executives are tasked with ensuring resilience and reporting to the board, they often hit resistance at the plant floor where production uptime and safety KPIs take priority. </p><p>The conversation explores IT/OT convergence, asset visibility blind spots, OEM restrictions, and the risks of relying on remote-only deployments. </p><p>With insights from decades of hands-on experience in industrial environments, Craig and Dino outline practical steps for building bridges between IT and OT, aligning financial risk with security strategy, and equipping CISOs with the authority they need to succeed.</p><h2>Chapters:</h2><ul><li>00:00:00 - Welcome to the Industrial Cybersecurity Insider Podcast</li><li>00:01:11 - The CISO's Core Conflict of Responsibility Without Authority</li><li>00:02:45 - Why Security Efforts Get "Kneecapped at the Front Door"</li><li>00:04:04 - Understanding the OT Environment and Its Unique Technology</li><li>00:05:36 - Building Bridges Between IT and OT as the Solution</li><li>00:07:44 - Overcoming OT's "Skittish" Resistance to IT</li><li>00:09:43 - The Scaling Problem of Too Few Engineers for Too Many Plants</li><li>00:10:57 - Why a Remote-First Approach Fails in Manufacturing</li><li>00:14:44 - The "Epiphany" of Uncovering Operational Benefits for OT Teams</li><li>00:17:24 - Navigating OEM Warranties and Equipment Restrictions</li><li>00:19:14 - The "Trust but Verify" Mandate for a CISO</li><li>00:20:56 - The Danger of Hidden Networks and the "Air Gap" Myth</li><li>00:23:16 - Speaking the Language of Business in Dollars and Cents</li><li>00:24:43 - Aligning Security with the Plant's Capital Master Plan</li><li>00:27:24 - How Company Ownership Affects Security Investment</li><li>00:28:16 - How to Give the CISO Real Authority</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/responsibility-without-authority-the-cisos-industrial-cybersecurity-dilemma]]></link><guid isPermaLink="false">0d1e6bd5-9fbe-4f21-a9b9-e87a10798b23</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 16 Sep 2025 08:15:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0d1e6bd5-9fbe-4f21-a9b9-e87a10798b23.mp3" length="29502426" type="audio/mpeg"/><itunes:duration>30:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>91</itunes:episode><podcast:episode>91</podcast:episode></item><item><title>The Critical Role of Local Knowledge in Industrial Cybersecurity</title><itunes:title>The Critical Role of Local Knowledge in Industrial Cybersecurity</itunes:title><description><![CDATA[<p>In this essential rewind episode, <a href="https://www.linkedin.com/in/dinobusalachi?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABl-dIBCwDr1jfVnIDKmyxpFlQ5LSXqIr8" rel="noopener noreferrer" target="_blank">Dino Busalachi</a> and <a href="https://www.linkedin.com/in/craigaduckworth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAWDtWgBfTwMHKBYPPoK7CQfoCNLFzF2FZQ" rel="noopener noreferrer" target="_blank">Craig Duckworth</a> address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection.</p><p>The Power of Local Partnership</p><p>Dino emphasizes a crucial principle that often gets overlooked in cybersecurity implementations: "The only way you can act local is you've got to work with those folks that are in those plants every day, all day."</p><p>This insight highlights why external cybersecurity consultants must forge strong partnerships with on-site operational teams who possess intimate knowledge of their industrial environments.</p><p>These local experts understand the nuanced details that can make or break a security implementation. This includes everything from vendor schedules and machine operations to maintenance windows and downtime planning.</p><p>They know when critical systems are most vulnerable and which processes absolutely cannot be interrupted.</p><p>Chapters:</p><ul><li>00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success</li><li>00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration</li><li>00:01:49 - Unpacking the Challenges of IT/OT Convergence</li><li>00:02:28 - Why IT and OT Teams Often Struggle to Align</li><li>00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity</li><li>00:07:33 - The Role of CIOs and CISOs in Driving Change</li><li>00:08:44 - Navigating the Complexities of Diverse Plant Environments</li><li>00:10:23 - Partnering with Vendors to Enhance Security Outcomes</li><li>00:11:16 - Key Questions to Evaluate System Integrators Effectively</li><li>00:16:35 - Using Tabletop Exercises to Align IT and OT Teams</li><li>00:22:20 - Closing Thoughts: Bridging the Divide for Unified Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this essential rewind episode, <a href="https://www.linkedin.com/in/dinobusalachi?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABl-dIBCwDr1jfVnIDKmyxpFlQ5LSXqIr8" rel="noopener noreferrer" target="_blank">Dino Busalachi</a> and <a href="https://www.linkedin.com/in/craigaduckworth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAWDtWgBfTwMHKBYPPoK7CQfoCNLFzF2FZQ" rel="noopener noreferrer" target="_blank">Craig Duckworth</a> address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection.</p><p>The Power of Local Partnership</p><p>Dino emphasizes a crucial principle that often gets overlooked in cybersecurity implementations: "The only way you can act local is you've got to work with those folks that are in those plants every day, all day."</p><p>This insight highlights why external cybersecurity consultants must forge strong partnerships with on-site operational teams who possess intimate knowledge of their industrial environments.</p><p>These local experts understand the nuanced details that can make or break a security implementation. This includes everything from vendor schedules and machine operations to maintenance windows and downtime planning.</p><p>They know when critical systems are most vulnerable and which processes absolutely cannot be interrupted.</p><p>Chapters:</p><ul><li>00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success</li><li>00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration</li><li>00:01:49 - Unpacking the Challenges of IT/OT Convergence</li><li>00:02:28 - Why IT and OT Teams Often Struggle to Align</li><li>00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity</li><li>00:07:33 - The Role of CIOs and CISOs in Driving Change</li><li>00:08:44 - Navigating the Complexities of Diverse Plant Environments</li><li>00:10:23 - Partnering with Vendors to Enhance Security Outcomes</li><li>00:11:16 - Key Questions to Evaluate System Integrators Effectively</li><li>00:16:35 - Using Tabletop Exercises to Align IT and OT Teams</li><li>00:22:20 - Closing Thoughts: Bridging the Divide for Unified Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-critical-role-of-local-knowledge-in-industrial-cybersecurity]]></link><guid isPermaLink="false">7218ee62-c365-4723-b520-fe40ea68eb1d</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 09 Sep 2025 09:45:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/7218ee62-c365-4723-b520-fe40ea68eb1d.mp3" length="58586479" type="audio/mpeg"/><itunes:duration>24:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>90</itunes:episode><podcast:episode>90</podcast:episode></item><item><title>FBI Alerts, OT Vulnerabilities, and What Comes Next</title><itunes:title>FBI Alerts, OT Vulnerabilities, and What Comes Next</itunes:title><description><![CDATA[<p>In this episode, Craig and Dino break down the FBI’s latest cybersecurity advisory and what it means for industrial organizations. </p><p>From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. </p><p>They discuss why manufacturing has become ransomware’s “cash register,” the importance of continuous monitoring and asset visibility, and why every organization must have an incident response plan in place before a crisis. </p><p>This episode is packed with real-world insights and actionable strategies. It's a must-listen for CISOs, CIOs, OT engineers, and plant leaders safeguarding manufacturing and critical infrastructure.</p><p>Chapters:</p><ul><li><strong>00:00:52</strong> - Welcome to Industrial Cybersecurity Insider Podcast</li><li><strong>00:01:21</strong> - A New FBI Advisory on Nation-State OT Threats</li><li><strong>00:02:37</strong> - Cisco Hardware on the Plant Floor Targeted in Advisory</li><li><strong>00:03:18</strong> - The IT/OT Disconnect: OT Assets are Often Invisible to InfoSec Teams</li><li><strong>00:04:19</strong> - The Awareness Gap: Critical Security Alerts Fail to Reach OT Operations</li><li><strong>00:04:54</strong> - The OT Cybersecurity Skills Gap and Cultural Divide</li><li><strong>00:07:32</strong> - Why All Manufacturing is Critical, Citing the JBS Breach</li><li><strong>00:08:37</strong> - The Staggering Economic Cost of OT Breaches</li><li><strong>00:09:33</strong> - The "Cash Register" Concept: Why Attackers Target Manufacturing</li><li><strong>00:10:29</strong> - OT as the New Frontier for Attacks on Unpatched Systems</li><li><strong>00:11:28</strong> - The "Disinterested Third Party": When OEMs See Security as the Client's Problem</li><li><strong>00:12:31</strong> - The Foundational First Step: Gaining Asset Visibility &amp; Continuous Monitoring</li><li><strong>00:13:53</strong> - The Impracticality of Patching in OT Due to Downtime and Safety Risks</li><li><strong>00:15:25</strong> - Academic vs. Practitioner: Why High-Level Advice Fails on the Plant Floor</li><li><strong>00:18:25</strong> - The Minimum Requirement: A Practiced, OT-Inclusive Incident Response Plan</li><li><strong>00:18:58</strong> - Why CISOs Must Build Relationships with Key OT Partners</li><li><strong>00:22:46</strong> - Practice, Partner, and Protect Now</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Craig and Dino break down the FBI’s latest cybersecurity advisory and what it means for industrial organizations. </p><p>From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. </p><p>They discuss why manufacturing has become ransomware’s “cash register,” the importance of continuous monitoring and asset visibility, and why every organization must have an incident response plan in place before a crisis. </p><p>This episode is packed with real-world insights and actionable strategies. It's a must-listen for CISOs, CIOs, OT engineers, and plant leaders safeguarding manufacturing and critical infrastructure.</p><p>Chapters:</p><ul><li><strong>00:00:52</strong> - Welcome to Industrial Cybersecurity Insider Podcast</li><li><strong>00:01:21</strong> - A New FBI Advisory on Nation-State OT Threats</li><li><strong>00:02:37</strong> - Cisco Hardware on the Plant Floor Targeted in Advisory</li><li><strong>00:03:18</strong> - The IT/OT Disconnect: OT Assets are Often Invisible to InfoSec Teams</li><li><strong>00:04:19</strong> - The Awareness Gap: Critical Security Alerts Fail to Reach OT Operations</li><li><strong>00:04:54</strong> - The OT Cybersecurity Skills Gap and Cultural Divide</li><li><strong>00:07:32</strong> - Why All Manufacturing is Critical, Citing the JBS Breach</li><li><strong>00:08:37</strong> - The Staggering Economic Cost of OT Breaches</li><li><strong>00:09:33</strong> - The "Cash Register" Concept: Why Attackers Target Manufacturing</li><li><strong>00:10:29</strong> - OT as the New Frontier for Attacks on Unpatched Systems</li><li><strong>00:11:28</strong> - The "Disinterested Third Party": When OEMs See Security as the Client's Problem</li><li><strong>00:12:31</strong> - The Foundational First Step: Gaining Asset Visibility &amp; Continuous Monitoring</li><li><strong>00:13:53</strong> - The Impracticality of Patching in OT Due to Downtime and Safety Risks</li><li><strong>00:15:25</strong> - Academic vs. Practitioner: Why High-Level Advice Fails on the Plant Floor</li><li><strong>00:18:25</strong> - The Minimum Requirement: A Practiced, OT-Inclusive Incident Response Plan</li><li><strong>00:18:58</strong> - Why CISOs Must Build Relationships with Key OT Partners</li><li><strong>00:22:46</strong> - Practice, Partner, and Protect Now</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/fbi-alerts-ot-vulnerabilities-and-what-comes-next]]></link><guid isPermaLink="false">6e1d206e-b24d-49a0-952c-e29c9e430367</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 03 Sep 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/6e1d206e-b24d-49a0-952c-e29c9e430367.mp3" length="57818382" type="audio/mpeg"/><itunes:duration>24:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>89</itunes:episode><podcast:episode>89</podcast:episode></item><item><title>AI, Phishing, and the Future of Industrial Cyber Defense</title><itunes:title>AI, Phishing, and the Future of Industrial Cyber Defense</itunes:title><description><![CDATA[<p>In this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. </p><p>The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. </p><p>Whether you’re dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.</p><p>Chapters:</p><ul><li>00:00:00 - Pandemic's Impact on Critical Infrastructure</li><li>00:01:08 - Introduction to Gary Neelan and Claroty</li><li>00:01:41 - Gary's Role in OT Cybersecurity</li><li>00:02:49 - Evolution of OT Cybersecurity: From Compliance to Strategy</li><li>00:05:23 - IT and OT Convergence: Securing Cyber-Physical Systems</li><li>00:09:46 - Addressing Complex Challenges in OT Cybersecurity</li><li>00:11:56 - OT Cybersecurity Talent Shortage and Managed Services</li><li>00:13:01 - Future of OT Cybersecurity: Adapting to New Threats</li><li>00:14:36 - Modernizing Manufacturing Systems for Enhanced Security</li><li>00:15:52 - Global Cybersecurity Trends in Critical Infrastructure</li><li>00:18:01 - Regional OT Cybersecurity Challenges and Responses</li><li>00:25:01 - The Role of AI in Defending OT Environments</li><li>00:28:19 - Final Thoughts on OT Cybersecurity's Future</li></ul><br/><p>Links And Resources:</p><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Gary Kneeland on <a href="https://www.linkedin.com/in/gary-kneeland-12b73568/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. </p><p>The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. </p><p>Whether you’re dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.</p><p>Chapters:</p><ul><li>00:00:00 - Pandemic's Impact on Critical Infrastructure</li><li>00:01:08 - Introduction to Gary Neelan and Claroty</li><li>00:01:41 - Gary's Role in OT Cybersecurity</li><li>00:02:49 - Evolution of OT Cybersecurity: From Compliance to Strategy</li><li>00:05:23 - IT and OT Convergence: Securing Cyber-Physical Systems</li><li>00:09:46 - Addressing Complex Challenges in OT Cybersecurity</li><li>00:11:56 - OT Cybersecurity Talent Shortage and Managed Services</li><li>00:13:01 - Future of OT Cybersecurity: Adapting to New Threats</li><li>00:14:36 - Modernizing Manufacturing Systems for Enhanced Security</li><li>00:15:52 - Global Cybersecurity Trends in Critical Infrastructure</li><li>00:18:01 - Regional OT Cybersecurity Challenges and Responses</li><li>00:25:01 - The Role of AI in Defending OT Environments</li><li>00:28:19 - Final Thoughts on OT Cybersecurity's Future</li></ul><br/><p>Links And Resources:</p><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Gary Kneeland on <a href="https://www.linkedin.com/in/gary-kneeland-12b73568/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/replay]]></link><guid isPermaLink="false">99bc8bc3-48be-4e63-b6b2-58109702de25</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 26 Aug 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/99bc8bc3-48be-4e63-b6b2-58109702de25.mp3" length="70686398" type="audio/mpeg"/><itunes:duration>29:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>88</itunes:episode><podcast:episode>88</podcast:episode></item><item><title>Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats</title><itunes:title>Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats</itunes:title><description><![CDATA[<p>In this hard-hitting episode of&nbsp;<em>Industrial Cybersecurity Insider</em>, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. </p><p>Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecurity losses happen regularly.</p><p>This isn't your typical cybersecurity podcast filled with vendor pitches and theoretical frameworks. Instead, you'll get an unvarnished look at what really happens when industrial organizations try to secure their critical infrastructure. </p><p>From the shocking reality of cyber insurance claims being denied over half-implemented multi-factor authentication to the all-too-common sight of HMI passwords scrawled in permanent marker on the plant floor. This conversation exposes the gap between cybersecurity best practices and industrial implementation and protection reality.</p><p><strong>What makes this episode essential listening:</strong></p><ul><li><strong>Real financial impact:</strong>&nbsp;Learn why industrial breaches cost $5.5-6 million on average, with downtime running $125,000 per hour</li><li><strong>Practical solutions that work:</strong>&nbsp;Discover how segmentation, virtual patching, and agentless endpoint tools can protect legacy systems without breaking the bank</li><li><strong>Political warfare decoded:</strong>&nbsp;Understand the often-toxic dynamics between IT and OT teams that sabotage security initiatives</li><li><strong>Implementation roadmaps:</strong>&nbsp;Get actionable strategies for deploying zero-trust architectures on the plant floor</li></ul><br/><p class="ql-align-justify">Whether you're a CISO struggling to justify OT security budgets, an engineer trying to protect decades-old industrial systems, or a consultant navigating the minefield of industrial cybersecurity politics, this episode delivers the kind of street-smart insights you won't find in vendor whitepapers.</p><p>Chapters:</p><ul><li>00:00:00 - Cyber insurance denied over incomplete MFA&nbsp;</li><li>00:03:21 - What clients face as they begin the OT security journey</li><li>00:06:35 - Industrial breach cost stat ($5.5–$6M; ~$125k/hour downtime)&nbsp;</li><li>00:07:36 - Too many IT tools forced into OT</li><li>00:08:47 - Investment hurdles and budgeting misalignment</li><li>00:11:05 - Collaboration between OT asset owners and the CISO</li><li>00:13:24 - Hamilton ransomware: 80% hit; cyber insurance denied for incomplete MFA</li><li>00:14:26 - HMI username/password written in Sharpie; segue to TXOne solutions</li><li>00:18:22 - Who embraces TXOne first—IT or OT?</li><li>00:20:58 - CISOs on OT priorities and piloting top sites</li><li>00:22:25 - The ugly: Lacking OT inventory, unclear playbooks, starting from zero</li><li>00:23:26 - The good: Safeguarding OT, anomaly alerts, avoiding risky legacy connections</li><li>00:24:34 - Healthcare imaging case: XP-based systems, high replacement costs</li><li>00:27:03 - AI useful in SOC/baselining; humans still required on OT side</li><li>00:29:15 - Combining best-of-breed solutions to avoid costly deployment gaps</li><li>00:29:47 - Why deployments stall—overwhelm and fatigue after tech selection</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Debbie Lay, TXOne Networks on <a href="https://www.linkedin.com/in/debbie-lay-5b8b2a2/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Patrick Gillespie, GuidePoint Security on <a href="https://www.linkedin.com/in/cpgillespie/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this hard-hitting episode of&nbsp;<em>Industrial Cybersecurity Insider</em>, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. </p><p>Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecurity losses happen regularly.</p><p>This isn't your typical cybersecurity podcast filled with vendor pitches and theoretical frameworks. Instead, you'll get an unvarnished look at what really happens when industrial organizations try to secure their critical infrastructure. </p><p>From the shocking reality of cyber insurance claims being denied over half-implemented multi-factor authentication to the all-too-common sight of HMI passwords scrawled in permanent marker on the plant floor. This conversation exposes the gap between cybersecurity best practices and industrial implementation and protection reality.</p><p><strong>What makes this episode essential listening:</strong></p><ul><li><strong>Real financial impact:</strong>&nbsp;Learn why industrial breaches cost $5.5-6 million on average, with downtime running $125,000 per hour</li><li><strong>Practical solutions that work:</strong>&nbsp;Discover how segmentation, virtual patching, and agentless endpoint tools can protect legacy systems without breaking the bank</li><li><strong>Political warfare decoded:</strong>&nbsp;Understand the often-toxic dynamics between IT and OT teams that sabotage security initiatives</li><li><strong>Implementation roadmaps:</strong>&nbsp;Get actionable strategies for deploying zero-trust architectures on the plant floor</li></ul><br/><p class="ql-align-justify">Whether you're a CISO struggling to justify OT security budgets, an engineer trying to protect decades-old industrial systems, or a consultant navigating the minefield of industrial cybersecurity politics, this episode delivers the kind of street-smart insights you won't find in vendor whitepapers.</p><p>Chapters:</p><ul><li>00:00:00 - Cyber insurance denied over incomplete MFA&nbsp;</li><li>00:03:21 - What clients face as they begin the OT security journey</li><li>00:06:35 - Industrial breach cost stat ($5.5–$6M; ~$125k/hour downtime)&nbsp;</li><li>00:07:36 - Too many IT tools forced into OT</li><li>00:08:47 - Investment hurdles and budgeting misalignment</li><li>00:11:05 - Collaboration between OT asset owners and the CISO</li><li>00:13:24 - Hamilton ransomware: 80% hit; cyber insurance denied for incomplete MFA</li><li>00:14:26 - HMI username/password written in Sharpie; segue to TXOne solutions</li><li>00:18:22 - Who embraces TXOne first—IT or OT?</li><li>00:20:58 - CISOs on OT priorities and piloting top sites</li><li>00:22:25 - The ugly: Lacking OT inventory, unclear playbooks, starting from zero</li><li>00:23:26 - The good: Safeguarding OT, anomaly alerts, avoiding risky legacy connections</li><li>00:24:34 - Healthcare imaging case: XP-based systems, high replacement costs</li><li>00:27:03 - AI useful in SOC/baselining; humans still required on OT side</li><li>00:29:15 - Combining best-of-breed solutions to avoid costly deployment gaps</li><li>00:29:47 - Why deployments stall—overwhelm and fatigue after tech selection</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Debbie Lay, TXOne Networks on <a href="https://www.linkedin.com/in/debbie-lay-5b8b2a2/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Patrick Gillespie, GuidePoint Security on <a href="https://www.linkedin.com/in/cpgillespie/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/partnership-in-action-when-legacy-systems-meet-modern-cybersecurity-threats]]></link><guid isPermaLink="false">1cc68227-feb4-4b07-b82d-a25f2df654e4</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 20 Aug 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1cc68227-feb4-4b07-b82d-a25f2df654e4.mp3" length="73882644" type="audio/mpeg"/><itunes:duration>30:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>87</itunes:episode><podcast:episode>87</podcast:episode></item><item><title>From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools</title><itunes:title>From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools</itunes:title><description><![CDATA[<p>Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. </p><p>In this hard-hitting episode, they dismantle the <em>false sense of OT security. </em>They explore why million-dollar cybersecurity tool investments aren't fully utilized, and expose the costly disconnect between corporate IT, plant-floor teams, and third-party vendors. </p><p>From debunking the <em>air gap</em> myth to stressing the need to <em>trust but verify</em> every connection, they show how to turn underutilized tools into proactive defenses that improve both security and operational efficiency. </p><p>If you think your ICS is fully protected, this conversation might change your mind.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: When Inefficiency Becomes Expensive</li><li>00:00:59 - The Hidden Danger of Feeling Secure in Manufacturing</li><li>00:03:58 - Why True Visibility and Accurate Data Change Everything</li><li>00:07:18 - Real-World Roadblocks: Missteps and Mixed Messages</li><li>00:10:24 - Who Holds the Power vs. Who Bears the Blame in Cybersecurity</li><li>00:21:47 - Charting a Smarter Path to Stronger Cyber Defenses</li><li>00:25:27 - Conclusion: Actionable Moves to Level Up Your Security</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. </p><p>In this hard-hitting episode, they dismantle the <em>false sense of OT security. </em>They explore why million-dollar cybersecurity tool investments aren't fully utilized, and expose the costly disconnect between corporate IT, plant-floor teams, and third-party vendors. </p><p>From debunking the <em>air gap</em> myth to stressing the need to <em>trust but verify</em> every connection, they show how to turn underutilized tools into proactive defenses that improve both security and operational efficiency. </p><p>If you think your ICS is fully protected, this conversation might change your mind.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: When Inefficiency Becomes Expensive</li><li>00:00:59 - The Hidden Danger of Feeling Secure in Manufacturing</li><li>00:03:58 - Why True Visibility and Accurate Data Change Everything</li><li>00:07:18 - Real-World Roadblocks: Missteps and Mixed Messages</li><li>00:10:24 - Who Holds the Power vs. Who Bears the Blame in Cybersecurity</li><li>00:21:47 - Charting a Smarter Path to Stronger Cyber Defenses</li><li>00:25:27 - Conclusion: Actionable Moves to Level Up Your Security</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-monitoring-blind-spot-in-ot-cybersecurity]]></link><guid isPermaLink="false">4e2b5c20-aedd-48ad-96d9-b7464b37d859</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Sun, 10 Aug 2025 00:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4e2b5c20-aedd-48ad-96d9-b7464b37d859.mp3" length="67743965" type="audio/mpeg"/><itunes:duration>28:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>86</itunes:episode><podcast:episode>86</podcast:episode></item><item><title>When the Plant Can&apos;t Stop: Securing Systems That Never Sleep</title><itunes:title>When the Plant Can&apos;t Stop: Securing Systems That Never Sleep</itunes:title><description><![CDATA[<p class="ql-align-justify">In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black &amp; Veatch, to explore what it really takes to secure complex industrial systems.&nbsp;</p><p class="ql-align-justify">Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the foundational questions every organization must answer:</p><ul><li class="ql-align-justify">What do you need to protect? </li><li class="ql-align-justify">Where are your holes? </li><li class="ql-align-justify">Can you see what's happening and respond if something goes wrong? </li></ul><br/><p class="ql-align-justify">From AI-enabled attackers to real-time asset visibility, he shares actionable insights on risk management, OT monitoring, and why leaders must begin treating cybersecurity like safety, not just an IT function.&nbsp;</p><p class="ql-align-justify">Whether you’re managing a water treatment plant, a power plant, or smart transportation infrastructure, this conversation delivers clarity in complexity - and guidance for what to do next.</p><p>Chapters:</p><ul><li>00:00:00 - Uncovering Hidden Dangers in Remote Access</li><li>00:00:59 - Meet Ian Bramson: Defending the World’s Most Critical Systems</li><li>00:02:58 - Why Critical Infrastructure Is Everyone’s Business</li><li>00:03:30 - Power and Water: The Frontlines of Cyber Defense</li><li>00:09:07 - Decoding NERC CIP: What You Really Need to Know</li><li>00:10:38 - Walking the Tightrope Between Compliance and True Security</li><li>00:17:01 - Proven Cybersecurity Tactics That Actually Work</li><li>00:22:50 - AI in Cybersecurity: Game-Changer or New Threat?</li><li>00:24:47 - How Public and Private Sectors Tackle Cyber Risk Differently</li><li>00:29:31 - Ian Bramson’s Final Playbook for Today’s CISOs</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p class="ql-align-justify">In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black &amp; Veatch, to explore what it really takes to secure complex industrial systems.&nbsp;</p><p class="ql-align-justify">Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the foundational questions every organization must answer:</p><ul><li class="ql-align-justify">What do you need to protect? </li><li class="ql-align-justify">Where are your holes? </li><li class="ql-align-justify">Can you see what's happening and respond if something goes wrong? </li></ul><br/><p class="ql-align-justify">From AI-enabled attackers to real-time asset visibility, he shares actionable insights on risk management, OT monitoring, and why leaders must begin treating cybersecurity like safety, not just an IT function.&nbsp;</p><p class="ql-align-justify">Whether you’re managing a water treatment plant, a power plant, or smart transportation infrastructure, this conversation delivers clarity in complexity - and guidance for what to do next.</p><p>Chapters:</p><ul><li>00:00:00 - Uncovering Hidden Dangers in Remote Access</li><li>00:00:59 - Meet Ian Bramson: Defending the World’s Most Critical Systems</li><li>00:02:58 - Why Critical Infrastructure Is Everyone’s Business</li><li>00:03:30 - Power and Water: The Frontlines of Cyber Defense</li><li>00:09:07 - Decoding NERC CIP: What You Really Need to Know</li><li>00:10:38 - Walking the Tightrope Between Compliance and True Security</li><li>00:17:01 - Proven Cybersecurity Tactics That Actually Work</li><li>00:22:50 - AI in Cybersecurity: Game-Changer or New Threat?</li><li>00:24:47 - How Public and Private Sectors Tackle Cyber Risk Differently</li><li>00:29:31 - Ian Bramson’s Final Playbook for Today’s CISOs</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/when-the-plant-cant-stop-securing-systems-that-never-sleep]]></link><guid isPermaLink="false">d39b5897-42e8-4d58-b7b6-d69954908826</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 05 Aug 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d39b5897-42e8-4d58-b7b6-d69954908826.mp3" length="79922251" type="audio/mpeg"/><itunes:duration>33:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>85</itunes:episode><podcast:episode>85</podcast:episode></item><item><title>The Lawyer&apos;s View: Strategic Lessons in Cybersecurity and Incident Response</title><itunes:title>The Lawyer&apos;s View: Strategic Lessons in Cybersecurity and Incident Response</itunes:title><description><![CDATA[<p>Craig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. </p><p>Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today’s hyper-connected, AI-augmented threat landscape. </p><p>Josh shares hard-earned insights from decades of incident response leadership, emphasizing why building your cyber playbook before the attack is critical. </p><p>From legal implications and executive missteps to the psychological attributes needed in your incident command post, this conversation is a masterclass in cyber resilience and proactive protection by design.</p><p>Chapters:</p><ul><li>00:00:00 – Kicking Off with Chaos: Why Incident Response Matters</li><li>00:01:02 – Enter Josh Cook: Legal Strategist Turned Cyber Commander</li><li>00:01:18 – War Stories and Wisdom: Josh’s Journey to Left of Boom</li><li>00:02:38 – Planning Beats Panic: Mastering the Art of Pre-Incident Prep</li><li>00:04:17 – Assembling the A-Team: Who Belongs in Your Cyber War Room</li><li>00:09:07 – AI at the Front Lines: Friend, Foe, or Something in Between?</li><li>00:12:42 – Industrial Chaos: What’s Really Holding Cybersecurity Back</li><li>00:16:07 – Boardroom to Shop Floor: Why the C-Suite Can’t Stay Silent</li><li>00:25:18 – No Secrets Here: Transparency and the Power of Telling the Truth</li><li>00:29:08 – Parting Shots: Josh’s Battle-Tested Advice for Resilience</li></ul><br/><p>Links And Resources:</p><ul><li>Josh Cook on <a href="https://www.linkedin.com/in/jnc2000/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.leftofboomconsulting.com/" rel="noopener noreferrer" target="_blank">Website</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. </p><p>Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today’s hyper-connected, AI-augmented threat landscape. </p><p>Josh shares hard-earned insights from decades of incident response leadership, emphasizing why building your cyber playbook before the attack is critical. </p><p>From legal implications and executive missteps to the psychological attributes needed in your incident command post, this conversation is a masterclass in cyber resilience and proactive protection by design.</p><p>Chapters:</p><ul><li>00:00:00 – Kicking Off with Chaos: Why Incident Response Matters</li><li>00:01:02 – Enter Josh Cook: Legal Strategist Turned Cyber Commander</li><li>00:01:18 – War Stories and Wisdom: Josh’s Journey to Left of Boom</li><li>00:02:38 – Planning Beats Panic: Mastering the Art of Pre-Incident Prep</li><li>00:04:17 – Assembling the A-Team: Who Belongs in Your Cyber War Room</li><li>00:09:07 – AI at the Front Lines: Friend, Foe, or Something in Between?</li><li>00:12:42 – Industrial Chaos: What’s Really Holding Cybersecurity Back</li><li>00:16:07 – Boardroom to Shop Floor: Why the C-Suite Can’t Stay Silent</li><li>00:25:18 – No Secrets Here: Transparency and the Power of Telling the Truth</li><li>00:29:08 – Parting Shots: Josh’s Battle-Tested Advice for Resilience</li></ul><br/><p>Links And Resources:</p><ul><li>Josh Cook on <a href="https://www.linkedin.com/in/jnc2000/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.leftofboomconsulting.com/" rel="noopener noreferrer" target="_blank">Website</a></li><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-lawyers-view-strategic-lessons-in-cybersecurity-and-incident-response]]></link><guid isPermaLink="false">65e27ac7-c8b2-4892-a84b-cfdd7093622c</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 29 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/65e27ac7-c8b2-4892-a84b-cfdd7093622c.mp3" length="77376879" type="audio/mpeg"/><itunes:duration>32:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>84</itunes:episode><podcast:episode>84</podcast:episode></item><item><title>Plant-Level Cyber Risk: Who’s Actually Responsible?</title><itunes:title>Plant-Level Cyber Risk: Who’s Actually Responsible?</itunes:title><description><![CDATA[<p>In this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. </p><p>The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control systems. They emphasize the need for improved governance, enhanced vendor accountability, and clear ownership of cyber risk. </p><p>Whether you're a CISO, CIO, or VP of Engineering, this episode offers actionable insight into bridging the IT/OT divide, securing plant floors, and building a cybersecurity strategy that works at the edge of your business.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why Transparency in Cyber Matters</li><li>00:00:43 - Who’s Talking? Meet Craig &amp; Dino</li><li>00:01:05 - The Big Question: What’s IT’s Role in Industrial Security?</li><li>00:01:35 - When Too Many Vendors = Chaos</li><li>00:02:37 - How to Actually Secure OT Environments</li><li>00:03:46 - Choosing the Right Partners (and Asking the Right Questions)</li><li>00:12:37 - Why Cyber Teams Need Plant Floor Time</li><li>00:14:24 - Getting Smarter: Use External Experts &amp; Vendor Summits</li><li>00:18:22 - IT Meets OT: Closing the Culture Gap</li><li>00:30:03 - What Now? Practical Next Steps for CISOs</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. </p><p>The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control systems. They emphasize the need for improved governance, enhanced vendor accountability, and clear ownership of cyber risk. </p><p>Whether you're a CISO, CIO, or VP of Engineering, this episode offers actionable insight into bridging the IT/OT divide, securing plant floors, and building a cybersecurity strategy that works at the edge of your business.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why Transparency in Cyber Matters</li><li>00:00:43 - Who’s Talking? Meet Craig &amp; Dino</li><li>00:01:05 - The Big Question: What’s IT’s Role in Industrial Security?</li><li>00:01:35 - When Too Many Vendors = Chaos</li><li>00:02:37 - How to Actually Secure OT Environments</li><li>00:03:46 - Choosing the Right Partners (and Asking the Right Questions)</li><li>00:12:37 - Why Cyber Teams Need Plant Floor Time</li><li>00:14:24 - Getting Smarter: Use External Experts &amp; Vendor Summits</li><li>00:18:22 - IT Meets OT: Closing the Culture Gap</li><li>00:30:03 - What Now? Practical Next Steps for CISOs</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/its-playbook-for-expanding-into-ot]]></link><guid isPermaLink="false">1590fecb-7af7-45f6-be2c-17a4146f921b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 22 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/1590fecb-7af7-45f6-be2c-17a4146f921b.mp3" length="73811688" type="audio/mpeg"/><itunes:duration>30:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>83</itunes:episode><podcast:episode>83</podcast:episode></item><item><title>The C-Suite&apos;s Role in Industrial Cybersecurity</title><itunes:title>The C-Suite&apos;s Role in Industrial Cybersecurity</itunes:title><description><![CDATA[<p>In this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. </p><p>They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cybersecurity strategies. </p><p>With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency. They emphasize the need for leadership to understand and lead the charge to ensure security for industrial control systems. </p><p>This episode serves as a wake-up call for executives to embrace their role in protecting their companies from potential adverse events. This episode highlights the fact that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.</p><p>Chapters:</p><ul><li>00:00:00 - Meet Dino and Craig</li><li>00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics</li><li>00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity</li><li>00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security</li><li>00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience</li><li>00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders</li><li>00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks</li><li>00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams</li><li>00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA</li><li>00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity</li><li>00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing Sector</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. </p><p>They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cybersecurity strategies. </p><p>With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency. They emphasize the need for leadership to understand and lead the charge to ensure security for industrial control systems. </p><p>This episode serves as a wake-up call for executives to embrace their role in protecting their companies from potential adverse events. This episode highlights the fact that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.</p><p>Chapters:</p><ul><li>00:00:00 - Meet Dino and Craig</li><li>00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics</li><li>00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity</li><li>00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security</li><li>00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience</li><li>00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders</li><li>00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks</li><li>00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams</li><li>00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA</li><li>00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity</li><li>00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing Sector</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-missteps-putting-the-c-suite-at-risk]]></link><guid isPermaLink="false">e4a45c60-fd9c-4df0-881e-9b037fdd2687</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Thu, 17 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e4a45c60-fd9c-4df0-881e-9b037fdd2687.mp3" length="60431769" type="audio/mpeg"/><itunes:duration>25:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>82</itunes:episode><podcast:episode>82</podcast:episode></item><item><title>Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor</title><itunes:title>Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor</itunes:title><description><![CDATA[<p>In this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity.</p><p>While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT teams to act upon. Unfortunately, plant floor personnel, system integrators, and OEMs working in these environments rarely get access to dashboards, asset inventories, or vulnerability reports.</p><p>Organizations must move beyond the "oil and water" mentality between IT and OT. This means involving plant personnel in cybersecurity decisions, sharing data with trusted partners who "build the cars" (not just buy them), and recognizing that effective OT security requires collaboration with the people who live and breathe on the plant floor every day.</p><p>Bottom Line: If you're not sharing cybersecurity data with your system integrators, OEMs, and plant operations teams, you're not practicing true IT-OT convergence. You're missing critical opportunities to improve your security posture where it matters most.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:49 - Unpacking the Challenges of IT/OT Convergence</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:02:28 - Why IT and OT Teams Often Struggle to Align</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:07:33 - The Role of CIOs and CISOs in Driving Change</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:08:44 - Navigating the Complexities of Diverse Plant Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:10:23 - Partnering with Vendors to Enhance Security Outcomes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:11:16 - Key Questions to Evaluate System Integrators Effectively</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:16:35 - Using Tabletop Exercises to Align IT and OT Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:22:20 - Closing Thoughts: Bridging the Divide for Unified Cybersecurity</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity.</p><p>While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT teams to act upon. Unfortunately, plant floor personnel, system integrators, and OEMs working in these environments rarely get access to dashboards, asset inventories, or vulnerability reports.</p><p>Organizations must move beyond the "oil and water" mentality between IT and OT. This means involving plant personnel in cybersecurity decisions, sharing data with trusted partners who "build the cars" (not just buy them), and recognizing that effective OT security requires collaboration with the people who live and breathe on the plant floor every day.</p><p>Bottom Line: If you're not sharing cybersecurity data with your system integrators, OEMs, and plant operations teams, you're not practicing true IT-OT convergence. You're missing critical opportunities to improve your security posture where it matters most.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:49 - Unpacking the Challenges of IT/OT Convergence</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:02:28 - Why IT and OT Teams Often Struggle to Align</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:07:33 - The Role of CIOs and CISOs in Driving Change</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:08:44 - Navigating the Complexities of Diverse Plant Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:10:23 - Partnering with Vendors to Enhance Security Outcomes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:11:16 - Key Questions to Evaluate System Integrators Effectively</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:16:35 - Using Tabletop Exercises to Align IT and OT Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:22:20 - Closing Thoughts: Bridging the Divide for Unified Cybersecurity</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/breaking-down-the-it-ot-wall]]></link><guid isPermaLink="false">4939e73f-221d-4033-b3da-c7a86a8365ac</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 08 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4939e73f-221d-4033-b3da-c7a86a8365ac.mp3" length="58586479" type="audio/mpeg"/><itunes:duration>24:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>81</itunes:episode><podcast:episode>81</podcast:episode></item><item><title>The System Integrator’s Role in Supporting OT Security</title><itunes:title>The System Integrator’s Role in Supporting OT Security</itunes:title><description><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/craigaduckworth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAWDtWgBfTwMHKBYPPoK7CQfoCNLFzF2FZQ" rel="noopener noreferrer" target="_blank">Craig Duckworth</a> and <a href="https://www.linkedin.com/in/dinobusalachi?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABl-dIBCwDr1jfVnIDKmyxpFlQ5LSXqIr8" rel="noopener noreferrer" target="_blank">Dino Busalachi</a> discuss the critical but often overlooked or misunderstood role of system integrators (SIs) in industrial cybersecurity.</p><p>Key Issues Identified:</p><ul><li>Organizations typically work with multiple specialized integrators across different facilities and systems</li><li>Some SIs lack cybersecurity expertise, focusing primarily on equipment functionality</li><li>Equipment can remain connected to networks for decades, with ownership and oversight changing hands over time</li><li>System integrators must exercise proper IT coordination to implement remote access solutions effectively</li></ul><br/><p>Recommendations:</p><ul><li>IT and OT teams should collaborate more closely with system integrators on cybersecurity planning</li><li>Organizations need to evaluate their SIs' cybersecurity capabilities and partnerships</li><li>Consider standardizing on integrators with demonstrated cybersecurity practices and vendor certifications</li><li>Apply the same due diligence used for IT vendor selection to OT system integrators</li></ul><br/><p>Bottom Line:&nbsp;System integrators are essential partners in executing industrial cybersecurity strategies and protection. Organizations must actively engage them in security conversations and ensure they have the necessary skills and partnerships to implement secure solutions for their plant environments from the start.</p><p>Chapters:</p><ul><li>00:00:00 - Real-World Ransomware Hits the Plant Floor</li><li>00:00:52 - Meet the System Integrators Shaping Your OT Plant Floor Security</li><li>00:01:17 - What System Integrators Really Do (and Don’t)</li><li>00:04:13 - Remote Access: The Hidden Backdoor Nobody Sees</li><li>00:08:34 - Why Ongoing Monitoring Is Non-Negotiable</li><li>00:13:30 - How to Pick the Right System Integrator For Your Operations</li><li>00:26:17 - Building Strong Partnerships with Your Integrators</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/craigaduckworth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAWDtWgBfTwMHKBYPPoK7CQfoCNLFzF2FZQ" rel="noopener noreferrer" target="_blank">Craig Duckworth</a> and <a href="https://www.linkedin.com/in/dinobusalachi?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABl-dIBCwDr1jfVnIDKmyxpFlQ5LSXqIr8" rel="noopener noreferrer" target="_blank">Dino Busalachi</a> discuss the critical but often overlooked or misunderstood role of system integrators (SIs) in industrial cybersecurity.</p><p>Key Issues Identified:</p><ul><li>Organizations typically work with multiple specialized integrators across different facilities and systems</li><li>Some SIs lack cybersecurity expertise, focusing primarily on equipment functionality</li><li>Equipment can remain connected to networks for decades, with ownership and oversight changing hands over time</li><li>System integrators must exercise proper IT coordination to implement remote access solutions effectively</li></ul><br/><p>Recommendations:</p><ul><li>IT and OT teams should collaborate more closely with system integrators on cybersecurity planning</li><li>Organizations need to evaluate their SIs' cybersecurity capabilities and partnerships</li><li>Consider standardizing on integrators with demonstrated cybersecurity practices and vendor certifications</li><li>Apply the same due diligence used for IT vendor selection to OT system integrators</li></ul><br/><p>Bottom Line:&nbsp;System integrators are essential partners in executing industrial cybersecurity strategies and protection. Organizations must actively engage them in security conversations and ensure they have the necessary skills and partnerships to implement secure solutions for their plant environments from the start.</p><p>Chapters:</p><ul><li>00:00:00 - Real-World Ransomware Hits the Plant Floor</li><li>00:00:52 - Meet the System Integrators Shaping Your OT Plant Floor Security</li><li>00:01:17 - What System Integrators Really Do (and Don’t)</li><li>00:04:13 - Remote Access: The Hidden Backdoor Nobody Sees</li><li>00:08:34 - Why Ongoing Monitoring Is Non-Negotiable</li><li>00:13:30 - How to Pick the Right System Integrator For Your Operations</li><li>00:26:17 - Building Strong Partnerships with Your Integrators</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/dino-and-craig-0701]]></link><guid isPermaLink="false">235b7d0b-5501-46ea-be1f-b20ce81dd682</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 01 Jul 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/235b7d0b-5501-46ea-be1f-b20ce81dd682.mp3" length="78304749" type="audio/mpeg"/><itunes:duration>32:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>80</itunes:episode><podcast:episode>80</podcast:episode></item><item><title>When IT Cyber Events Bring Down the Plant Floor</title><itunes:title>When IT Cyber Events Bring Down the Plant Floor</itunes:title><description><![CDATA[<p>Craig and Dino break down how cyberattacks that start in traditional IT systems can shut down entire manufacturing production lines, leading to massive financial losses. </p><p>Using real-world examples like UNFI's $500 million drop in market value in 60 hours, they explain how overlooked connections between IT and the OT plant floor are often the weakest links. </p><p>You’ll hear why simply installing firewalls isn’t enough, how organizational silos between IT and operations cause major blind spots, and what it really takes to secure industrial equipment. </p><p>Whether you're in leadership, technology, or operations, this episode will change how you think about cyber risk and business continuity in connected environments.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: Where Responsibility Ends and Authority Doesn’t Begin</li><li>00:01:08 - Meet Your Guides: Dino &amp; Craig On the Frontlines</li><li>00:01:14 - When Cyber Hits the Plant Floor</li><li>00:01:28 - Real-World Wake-Up: The Unify IT Incident</li><li>00:02:36 - The Gaps No One’s Watching in OT Security</li><li>00:03:18 - How Org Structure Can Make or Break Cyber Defense</li><li>00:04:03 - Plugging in OT Visibility: IDS in Action</li><li>00:04:43 - Who’s Really Calling the Shots—Corporate or the Plant?</li><li>00:07:02 - IT-OT Convergence: What Leaders Must Understand</li><li>00:13:14 - Building Cyber Defense That Actually Works</li><li>00:15:25 - Recovery Starts Before the Breach</li><li>00:17:37 - Why IT Alone Can’t Fix OT Problems</li><li>00:24:55 - Just Getting Started? Here’s What to Do First</li><li>00:28:33 - Final Word: You Can’t Secure OT Alone</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino break down how cyberattacks that start in traditional IT systems can shut down entire manufacturing production lines, leading to massive financial losses. </p><p>Using real-world examples like UNFI's $500 million drop in market value in 60 hours, they explain how overlooked connections between IT and the OT plant floor are often the weakest links. </p><p>You’ll hear why simply installing firewalls isn’t enough, how organizational silos between IT and operations cause major blind spots, and what it really takes to secure industrial equipment. </p><p>Whether you're in leadership, technology, or operations, this episode will change how you think about cyber risk and business continuity in connected environments.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: Where Responsibility Ends and Authority Doesn’t Begin</li><li>00:01:08 - Meet Your Guides: Dino &amp; Craig On the Frontlines</li><li>00:01:14 - When Cyber Hits the Plant Floor</li><li>00:01:28 - Real-World Wake-Up: The Unify IT Incident</li><li>00:02:36 - The Gaps No One’s Watching in OT Security</li><li>00:03:18 - How Org Structure Can Make or Break Cyber Defense</li><li>00:04:03 - Plugging in OT Visibility: IDS in Action</li><li>00:04:43 - Who’s Really Calling the Shots—Corporate or the Plant?</li><li>00:07:02 - IT-OT Convergence: What Leaders Must Understand</li><li>00:13:14 - Building Cyber Defense That Actually Works</li><li>00:15:25 - Recovery Starts Before the Breach</li><li>00:17:37 - Why IT Alone Can’t Fix OT Problems</li><li>00:24:55 - Just Getting Started? Here’s What to Do First</li><li>00:28:33 - Final Word: You Can’t Secure OT Alone</li></ul><br/><p>Links And Resources:</p><ul><li>Want to Sponsor an episode or be a Guest? <a href="https://www.linkedin.com/in/luraelumpkin" rel="noopener noreferrer" target="_blank">Reach out here.</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/craig-dino]]></link><guid isPermaLink="false">34aa8411-7038-46cd-ac26-45173a2d7288</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 24 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/34aa8411-7038-46cd-ac26-45173a2d7288.mp3" length="71480520" type="audio/mpeg"/><itunes:duration>29:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>79</itunes:episode><podcast:episode>79</podcast:episode></item><item><title>When CISOs Inherit the Plant Floor: What Happens Next?</title><itunes:title>When CISOs Inherit the Plant Floor: What Happens Next?</itunes:title><description><![CDATA[<p>What happens when the CISO inherits responsibility for the security of the plant floor?</p><p>Dino and Craig discuss a growing trend: CISOs are being expected to oversee cybersecurity for industrial plant floors. Unfortunately, they don't have the background to effectively take on this responsibility.</p><p>A perpetuating trend exists where cybersecurity leaders are expected to protect factories and industrial assets without the authority, tools, or support to do so effectively.</p><p>In this conversation, Dino and Craig explain why traditional IT security approaches don’t work in these environments, and how things like outdated equipment, disconnected systems, and outside vendors make the challenge even harder. </p><p>From weak remote access tools to the confusion around who actually manages plant security, this episode shines a light on the hidden risks most companies overlook.</p><p>Whether you're in IT, operations, or a leadership role, you’ll walk away with a better understanding of how to approach cybersecurity in complex industrial settings.</p><p>You'll also gain insights into the steps you can take to protect your people, your technology, and your bottom line.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Smart Tool Choices Start Here</li><li>00:01:02 - When CISOs Inherit the Factory Floor</li><li>00:02:17 - Making Friends with OEMs and Integrators</li><li>00:04:47 - Why OT Security Is a Whole Different Beast</li><li>00:08:50 - Cyber Budgets: Where’s the Money Really Coming From?</li><li>00:13:10 - How to Actually Roll Out Security in the Plant</li><li>00:18:35 - VPNs Aren’t Enough: Fixing Remote Access</li><li>00:24:42 - What OT Incident Response Really Looks Like</li><li>00:27:17 - Wrapping It Up: Strategy, Buy-In, and What’s Next</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>What happens when the CISO inherits responsibility for the security of the plant floor?</p><p>Dino and Craig discuss a growing trend: CISOs are being expected to oversee cybersecurity for industrial plant floors. Unfortunately, they don't have the background to effectively take on this responsibility.</p><p>A perpetuating trend exists where cybersecurity leaders are expected to protect factories and industrial assets without the authority, tools, or support to do so effectively.</p><p>In this conversation, Dino and Craig explain why traditional IT security approaches don’t work in these environments, and how things like outdated equipment, disconnected systems, and outside vendors make the challenge even harder. </p><p>From weak remote access tools to the confusion around who actually manages plant security, this episode shines a light on the hidden risks most companies overlook.</p><p>Whether you're in IT, operations, or a leadership role, you’ll walk away with a better understanding of how to approach cybersecurity in complex industrial settings.</p><p>You'll also gain insights into the steps you can take to protect your people, your technology, and your bottom line.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Smart Tool Choices Start Here</li><li>00:01:02 - When CISOs Inherit the Factory Floor</li><li>00:02:17 - Making Friends with OEMs and Integrators</li><li>00:04:47 - Why OT Security Is a Whole Different Beast</li><li>00:08:50 - Cyber Budgets: Where’s the Money Really Coming From?</li><li>00:13:10 - How to Actually Roll Out Security in the Plant</li><li>00:18:35 - VPNs Aren’t Enough: Fixing Remote Access</li><li>00:24:42 - What OT Incident Response Really Looks Like</li><li>00:27:17 - Wrapping It Up: Strategy, Buy-In, and What’s Next</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/when-cisos-take-over-the-plant-floor]]></link><guid isPermaLink="false">cbc44082-885b-471b-8f97-902c6e4104d6</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 17 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/cbc44082-885b-471b-8f97-902c6e4104d6.mp3" length="69191149" type="audio/mpeg"/><itunes:duration>28:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>78</itunes:episode><podcast:episode>78</podcast:episode></item><item><title>Reflections from the Front Lines of Industrial Cyber Failures</title><itunes:title>Reflections from the Front Lines of Industrial Cyber Failures</itunes:title><description><![CDATA[<p>In this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. </p><p>This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insider threats, and the cloud’s role on the plant floor. </p><p>The discussion exposes how legacy systems, poor collaboration, alert fatigue, and vendor dependency continue to sabotage industrial cybersecurity. </p><p>They discuss tactical strategies for improving, from asset inventory and patching hygiene to choosing the right partners and walking the plant floor.</p><p>Chapters:</p><ul><li>00:00:00 - Cyber threats are moving faster than your patch cycle</li><li>00:00:47 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-senior-solutions-architect-of-txone-networks-debbie-lay/" rel="noopener noreferrer" target="_blank">Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks</a></li><li>00:07:48 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/air-gapped-no-more-the-myth-thats-risking-your-ot-assets/" rel="noopener noreferrer" target="_blank">The #1 Myth Putting Your Industrial OT Assets at Risk</a></li><li>00:15:01 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/patching-and-updates-a-unified-approach-for-it-and-ot/" rel="noopener noreferrer" target="_blank">Patch Management and Software Updates: IT versus OT</a></li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. </p><p>This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insider threats, and the cloud’s role on the plant floor. </p><p>The discussion exposes how legacy systems, poor collaboration, alert fatigue, and vendor dependency continue to sabotage industrial cybersecurity. </p><p>They discuss tactical strategies for improving, from asset inventory and patching hygiene to choosing the right partners and walking the plant floor.</p><p>Chapters:</p><ul><li>00:00:00 - Cyber threats are moving faster than your patch cycle</li><li>00:00:47 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-senior-solutions-architect-of-txone-networks-debbie-lay/" rel="noopener noreferrer" target="_blank">Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks</a></li><li>00:07:48 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/air-gapped-no-more-the-myth-thats-risking-your-ot-assets/" rel="noopener noreferrer" target="_blank">The #1 Myth Putting Your Industrial OT Assets at Risk</a></li><li>00:15:01 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/patching-and-updates-a-unified-approach-for-it-and-ot/" rel="noopener noreferrer" target="_blank">Patch Management and Software Updates: IT versus OT</a></li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/reflections-from-the-front-lines-of-industrial-cyber-failures]]></link><guid isPermaLink="false">b2beb207-577c-40cb-8b23-6f7270543944</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Thu, 12 Jun 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/b2beb207-577c-40cb-8b23-6f7270543944.mp3" length="52719377" type="audio/mpeg"/><itunes:duration>21:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>77</itunes:episode><podcast:episode>77</podcast:episode></item><item><title>What Every CISO Gets Wrong About OT Security</title><itunes:title>What Every CISO Gets Wrong About OT Security</itunes:title><description><![CDATA[<p>In this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence. </p><p>But is it truly convergence or more of a collision? </p><p>Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and strategic influence. </p><p>From secure-by-design to system integrators' evolving role, this conversation is a call to action for CISOs, CIOs, and engineering leaders to rethink how they build cybersecurity partnerships across the plant floor.</p><p>Chapters:</p><ul><li>00:00:00 - Opening Shot: Who’s Really in Charge—CIOs or the Plant Floor?</li><li>00:00:57 - Collision Course: IT and OT Can’t Keep Dodging Each Other</li><li>00:01:52 - Two Worlds, One Mission: Why OT Isn’t Just “IT in a Hard Hat”</li><li>00:04:07 - When Convergence Fails: What’s Missing in the Middle</li><li>00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration</li><li>00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor</li><li>00:10:46 - OT’s Tipping Point: Will the Next Move Come from IT, or the Shop Floor?</li><li>00:17:32 - Your Move: What Leaders Must Do Next (Before It’s Too Late)</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino and Craig tackle one of the most misunderstood topics in industrial cybersecurity: IT/OT convergence. </p><p>But is it truly convergence or more of a collision? </p><p>Drawing from real-world experiences, they challenge the idea that OT is a “shadow IT group” and argue that operational technology deserves distinct governance, funding, and strategic influence. </p><p>From secure-by-design to system integrators' evolving role, this conversation is a call to action for CISOs, CIOs, and engineering leaders to rethink how they build cybersecurity partnerships across the plant floor.</p><p>Chapters:</p><ul><li>00:00:00 - Opening Shot: Who’s Really in Charge—CIOs or the Plant Floor?</li><li>00:00:57 - Collision Course: IT and OT Can’t Keep Dodging Each Other</li><li>00:01:52 - Two Worlds, One Mission: Why OT Isn’t Just “IT in a Hard Hat”</li><li>00:04:07 - When Convergence Fails: What’s Missing in the Middle</li><li>00:05:54 - Breaking Silos: Why Cybersecurity Demands True Collaboration</li><li>00:08:22 - Real Talk: What Cyber Protection Looks Like on the Plant Floor</li><li>00:10:46 - OT’s Tipping Point: Will the Next Move Come from IT, or the Shop Floor?</li><li>00:17:32 - Your Move: What Leaders Must Do Next (Before It’s Too Late)</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/what-every-ciso-gets-wrong-about-ot-security]]></link><guid isPermaLink="false">9409eafb-fba0-4800-bb30-7083327f2c43</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Thu, 05 Jun 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9409eafb-fba0-4800-bb30-7083327f2c43.mp3" length="50028765" type="audio/mpeg"/><itunes:duration>20:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>76</itunes:episode><podcast:episode>76</podcast:episode></item><item><title>OT Security in Hindsight: Visibility, Authority, and the Executive Disconnect</title><itunes:title>OT Security in Hindsight: Visibility, Authority, and the Executive Disconnect</itunes:title><description><![CDATA[<p>In this special rewind edition of <em>Industrial Cybersecurity Insider</em>, we revisit some of the most powerful insights shared on how to elevate OT cybersecurity across complex, distributed environments. </p><p>From budget allocation strategies to disaster recovery frameworks and the nuances of executive engagement, this episode distills frontline lessons into a compact, high-impact listen. </p><p>Whether you're navigating remote access risks, managing hybrid architectures, or striving to align plant managers with corporate cybersecurity goals, these reflections are a roadmap for driving resilience and maturity in your OT security strategy.</p><p>Chapters:</p><ul><li>00:00:00 - Rewind Kickoff: From Blind Spots to Bold Predictions</li><li>00:00:46 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/what-every-plant-manager-needs-to-know-about-cybersecurity/" rel="noopener noreferrer" target="_blank">The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort</a></li><li>00:10:57 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/doj-regulations-and-the-future-of-ot-cybersecurity-policy/" rel="noopener noreferrer" target="_blank">Gartner, DOGE, and the Future of OT Cybersecurity Policy</a></li><li>00:21:38 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/why-vpns-are-not-the-answer-for-ot-access/" rel="noopener noreferrer" target="_blank">Uncovering Blind Spots in OT Cybersecurity</a></li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this special rewind edition of <em>Industrial Cybersecurity Insider</em>, we revisit some of the most powerful insights shared on how to elevate OT cybersecurity across complex, distributed environments. </p><p>From budget allocation strategies to disaster recovery frameworks and the nuances of executive engagement, this episode distills frontline lessons into a compact, high-impact listen. </p><p>Whether you're navigating remote access risks, managing hybrid architectures, or striving to align plant managers with corporate cybersecurity goals, these reflections are a roadmap for driving resilience and maturity in your OT security strategy.</p><p>Chapters:</p><ul><li>00:00:00 - Rewind Kickoff: From Blind Spots to Bold Predictions</li><li>00:00:46 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/what-every-plant-manager-needs-to-know-about-cybersecurity/" rel="noopener noreferrer" target="_blank">The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort</a></li><li>00:10:57 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/doj-regulations-and-the-future-of-ot-cybersecurity-policy/" rel="noopener noreferrer" target="_blank">Gartner, DOGE, and the Future of OT Cybersecurity Policy</a></li><li>00:21:38 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/why-vpns-are-not-the-answer-for-ot-access/" rel="noopener noreferrer" target="_blank">Uncovering Blind Spots in OT Cybersecurity</a></li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ot-security-in-hindsight-visibility-authority-and-the-executive-disconnect]]></link><guid isPermaLink="false">3be083e7-675a-47f4-b61a-80317137c1b5</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 27 May 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/3be083e7-675a-47f4-b61a-80317137c1b5.mp3" length="71419916" type="audio/mpeg"/><itunes:duration>29:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>75</itunes:episode><podcast:episode>75</podcast:episode></item><item><title>Bridging the IT-OT Divide with AI-Powered Insight</title><itunes:title>Bridging the IT-OT Divide with AI-Powered Insight</itunes:title><description><![CDATA[<p>Dino and Craig tackle one of the most misunderstood challenges in cybersecurity for industrial environments. The persistent disconnect between IT-led cybersecurity tools and operational technology realities.</p><p>They explore the concept of "shadow OT," as well as the limits of traditional IDS deployments.</p><p>They discuss why visibility is key to protecting critical systems. Vulnerability scanning alone isn't enough.</p><p>Real world case studies reveal how failing to engage OT teams derails cybersecurity strategies. </p><p>One case involved rogue servers causing daily production failures. Another featured misconfigured modules choking brewery operations. These examples show that even the most advanced strategies fail without OT team involvement.</p><p>For leaders in manufacturing, utilities, and critical infrastructure, this is a must-listen conversation. It's about redefining risk management through OT-first thinking.</p><p>Chapters:</p><ul><li>00:00:00 - When Machines Stop, Money Bleeds: The Downtime Dilemma</li><li>00:00:47 - Shadow IT or Ingenious OT? Rethinking Rogue Tech</li><li>00:02:29 - Cybersecurity Isn’t Enough: The OT Risk You’re Missing</li><li>00:04:37 - Server Ghosts &amp; Brewery Blunders: Fixing What IT Can’t See</li><li>00:06:41 - Visibility is Power: Using the Tools You Already Own</li><li>00:09:50 - IT vs. OT: Breaking Silos, Building Alliances</li><li>00:13:28 - Final Thoughts: Who Really Owns OT Security?</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino and Craig tackle one of the most misunderstood challenges in cybersecurity for industrial environments. The persistent disconnect between IT-led cybersecurity tools and operational technology realities.</p><p>They explore the concept of "shadow OT," as well as the limits of traditional IDS deployments.</p><p>They discuss why visibility is key to protecting critical systems. Vulnerability scanning alone isn't enough.</p><p>Real world case studies reveal how failing to engage OT teams derails cybersecurity strategies. </p><p>One case involved rogue servers causing daily production failures. Another featured misconfigured modules choking brewery operations. These examples show that even the most advanced strategies fail without OT team involvement.</p><p>For leaders in manufacturing, utilities, and critical infrastructure, this is a must-listen conversation. It's about redefining risk management through OT-first thinking.</p><p>Chapters:</p><ul><li>00:00:00 - When Machines Stop, Money Bleeds: The Downtime Dilemma</li><li>00:00:47 - Shadow IT or Ingenious OT? Rethinking Rogue Tech</li><li>00:02:29 - Cybersecurity Isn’t Enough: The OT Risk You’re Missing</li><li>00:04:37 - Server Ghosts &amp; Brewery Blunders: Fixing What IT Can’t See</li><li>00:06:41 - Visibility is Power: Using the Tools You Already Own</li><li>00:09:50 - IT vs. OT: Breaking Silos, Building Alliances</li><li>00:13:28 - Final Thoughts: Who Really Owns OT Security?</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/bridging-the-it-ot-divide-with-ai-powered-insight]]></link><guid isPermaLink="false">5fbc563f-ec21-4be1-8d1d-b27b4f9db793</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 20 May 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/5fbc563f-ec21-4be1-8d1d-b27b4f9db793.mp3" length="40802316" type="audio/mpeg"/><itunes:duration>17:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>74</itunes:episode><podcast:episode>74</podcast:episode></item><item><title>Visibility Revisited: Trends Shaping the Future of OT Cybersecurity</title><itunes:title>Visibility Revisited: Trends Shaping the Future of OT Cybersecurity</itunes:title><description><![CDATA[<p>In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity.</p><p>Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated OT cybersecurity roles.</p><p>We address the critical need for alignment between capital and operational expenditures, and the importance of selecting technologies that provide actionable visibility across diverse plant environments. </p><p>Listeners will gain strategic guidance on integrating cybersecurity into capital planning, addressing asset variability across sites, and implementing scalable, non-disruptive security frameworks. </p><p>From OT-specific IDS deployment to balancing remote access with zero-trust principles, this episode offers practical, forward-looking advice.</p><p>Whether you're a practitioner or a decision-maker, focused on securing extended IIoT environments while maintaining operational resilience, this episode covers practical and relatable challenges and solutions.</p><p>Chapters:</p><ul><li>00:00:00 – A Strategic Rewind: Exploring the Emerging Roles, Budget Realities, and Lessons Learned in OT Cybersecurity</li><li>00:00:41 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/doj-regulations-and-the-future-of-ot-cybersecurity-policy/" rel="noopener noreferrer" target="_blank">Gartner, DOGE, and the Future of OT Cybersecurity Policy</a></li><li>00:12:12 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-emma-duckworth/" rel="noopener noreferrer" target="_blank">The Future Looks Bright : Building a Career in  OT Cybersecurity</a></li><li>00:22:44 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-gary-kneeland/" rel="noopener noreferrer" target="_blank">AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty</a></li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this special rewind episode we highlight outside influences shaping control system integrity, the impact of AI, emerging technologies, and the dynamics of building a career in OT cybersecurity.</p><p>Drawing from frontline experiences and industry events like the S4 Conference, the discussion explores the growing organizational shift toward dedicated OT cybersecurity roles.</p><p>We address the critical need for alignment between capital and operational expenditures, and the importance of selecting technologies that provide actionable visibility across diverse plant environments. </p><p>Listeners will gain strategic guidance on integrating cybersecurity into capital planning, addressing asset variability across sites, and implementing scalable, non-disruptive security frameworks. </p><p>From OT-specific IDS deployment to balancing remote access with zero-trust principles, this episode offers practical, forward-looking advice.</p><p>Whether you're a practitioner or a decision-maker, focused on securing extended IIoT environments while maintaining operational resilience, this episode covers practical and relatable challenges and solutions.</p><p>Chapters:</p><ul><li>00:00:00 – A Strategic Rewind: Exploring the Emerging Roles, Budget Realities, and Lessons Learned in OT Cybersecurity</li><li>00:00:41 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/doj-regulations-and-the-future-of-ot-cybersecurity-policy/" rel="noopener noreferrer" target="_blank">Gartner, DOGE, and the Future of OT Cybersecurity Policy</a></li><li>00:12:12 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-emma-duckworth/" rel="noopener noreferrer" target="_blank">The Future Looks Bright : Building a Career in  OT Cybersecurity</a></li><li>00:22:44 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-gary-kneeland/" rel="noopener noreferrer" target="_blank">AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty</a></li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/visibility-revisited-past-insights-shaping-future-ot-security]]></link><guid isPermaLink="false">9ec850a5-6645-48ee-b2d5-4e8f2e89dc92</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 13 May 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9ec850a5-6645-48ee-b2d5-4e8f2e89dc92.mp3" length="84373516" type="audio/mpeg"/><itunes:duration>35:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>73</itunes:episode><podcast:episode>73</podcast:episode></item><item><title>Stuxnet to Colonial Pipeline What Have We Learned &amp; What’s on the Horizon?</title><itunes:title>Stuxnet to Colonial Pipeline What Have We Learned &amp; What’s on the Horizon?</itunes:title><description><![CDATA[<p>Dino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. </p><p>From his early fascination with hacking culture to leading OT security for one of the world’s largest engineering firms, Mike shares personal insights and lessons learned. </p><p>The conversation covers the delayed cybersecurity maturity in OT environments and the lasting impact of the Colonial Pipeline breach.</p><p>They address the crucial role of visibility, engineering partnerships, and cultural buy-in when building secure industrial systems. </p><p>Whether you’re managing pipelines, power grids, or manufacturing floors, this episode delivers actionable insights and strategic foresight for leaders protecting our most vital infrastructure.</p><p>Chapters:</p><ul><li>00:00:00 - Why OT Security Still Falls Behind</li><li>00:01:03 - Mike Holcomb’s Unlikely Path to Cybersecurity</li><li>00:01:23 - Hacking Curiosity and a Love for Breaking Things</li><li>00:02:16 - From Network Admin to OT Defender</li><li>00:03:08 - Stuxnet, Colonial, and the Wake-Up Calls We Ignored</li><li>00:06:18 - When OT and IT Don’t Speak the Same Language</li><li>00:12:14 - Threats Are Getting Smarter — Are We Keeping Up?</li><li>00:26:29 - Evolving the Culture of Cyber Hygiene</li><li>00:32:14 - Final Takeaways for Security Leaders</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.linkedin.com/in/mikeholcomb/" rel="noopener noreferrer" target="_blank">Mike Holcomb on LinkedIn</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino sits down with Mike Holcomb, Fellow and Director of ICS/OT Cybersecurity at Fluor, to explore the critical, and often overlooked challenges in securing operational technology. </p><p>From his early fascination with hacking culture to leading OT security for one of the world’s largest engineering firms, Mike shares personal insights and lessons learned. </p><p>The conversation covers the delayed cybersecurity maturity in OT environments and the lasting impact of the Colonial Pipeline breach.</p><p>They address the crucial role of visibility, engineering partnerships, and cultural buy-in when building secure industrial systems. </p><p>Whether you’re managing pipelines, power grids, or manufacturing floors, this episode delivers actionable insights and strategic foresight for leaders protecting our most vital infrastructure.</p><p>Chapters:</p><ul><li>00:00:00 - Why OT Security Still Falls Behind</li><li>00:01:03 - Mike Holcomb’s Unlikely Path to Cybersecurity</li><li>00:01:23 - Hacking Curiosity and a Love for Breaking Things</li><li>00:02:16 - From Network Admin to OT Defender</li><li>00:03:08 - Stuxnet, Colonial, and the Wake-Up Calls We Ignored</li><li>00:06:18 - When OT and IT Don’t Speak the Same Language</li><li>00:12:14 - Threats Are Getting Smarter — Are We Keeping Up?</li><li>00:26:29 - Evolving the Culture of Cyber Hygiene</li><li>00:32:14 - Final Takeaways for Security Leaders</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.linkedin.com/in/mikeholcomb/" rel="noopener noreferrer" target="_blank">Mike Holcomb on LinkedIn</a></li><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.bwdesigngroup.com/sub-capability/cybersecurity" rel="noopener noreferrer" target="_blank">BW Design Group Cybersecurity</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-mike-holcomb]]></link><guid isPermaLink="false">0bb3c815-c592-45f3-ae33-ede787bdcec5</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 06 May 2025 04:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0bb3c815-c592-45f3-ae33-ede787bdcec5.mp3" length="78995426" type="audio/mpeg"/><itunes:duration>32:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>72</itunes:episode><podcast:episode>72</podcast:episode></item><item><title>Bridging IT/OT &amp; Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo</title><itunes:title>Bridging IT/OT &amp; Securing ICS: Kevin Kumpf, Chief OT / ICS Security Strategist, Cyolo</itunes:title><description><![CDATA[<p>Dino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. </p><p>Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized security tools - or "shelfware." </p><p>From real-world examples involving breweries, milk production, and energy plants, the conversation uncovers how lack of visibility, broken remote access practices, and aging systems create critical vulnerabilities. </p><p>Most importantly, Kevin offers actionable advice for CISOs, CTOs, and plant managers on building resilient cybersecurity frameworks without disrupting operations. </p><p>Don't miss this episode full of practical advice from industry experts.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why OT Cybersecurity Can't Wait</li><li>00:01:18 - Meet Kevin Kumpf: From Bank Vaults to Industrial Battlegrounds</li><li>00:02:56 - Hard Truths About Securing Operational Technology</li><li>00:06:42 - Shelfware Syndrome: Why Tools Fail Without Strategy</li><li>00:12:09 - Plant Managers, Vendors, and the Battle for Cyber Resilience</li><li>00:23:56 - Remote Access Exposed: The Hidden Risks Inside Your Plant</li><li>00:30:58 - Closing Thoughts: Building Stronger, Smarter Industrial Defenses</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino welcomes Kevin Kumpf, Chief OT/ICS Security Strategist at Cyolo to this episode. They discuss the growing challenges and evolving strategies around cybersecurity in industrial environments. </p><p>Kevin shares a seasoned perspective on bridging the gap between IT and OT, busting myths about Zero Trust certifications, and the dangers of underutilized security tools - or "shelfware." </p><p>From real-world examples involving breweries, milk production, and energy plants, the conversation uncovers how lack of visibility, broken remote access practices, and aging systems create critical vulnerabilities. </p><p>Most importantly, Kevin offers actionable advice for CISOs, CTOs, and plant managers on building resilient cybersecurity frameworks without disrupting operations. </p><p>Don't miss this episode full of practical advice from industry experts.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why OT Cybersecurity Can't Wait</li><li>00:01:18 - Meet Kevin Kumpf: From Bank Vaults to Industrial Battlegrounds</li><li>00:02:56 - Hard Truths About Securing Operational Technology</li><li>00:06:42 - Shelfware Syndrome: Why Tools Fail Without Strategy</li><li>00:12:09 - Plant Managers, Vendors, and the Battle for Cyber Resilience</li><li>00:23:56 - Remote Access Exposed: The Hidden Risks Inside Your Plant</li><li>00:30:58 - Closing Thoughts: Building Stronger, Smarter Industrial Defenses</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/bridging-it-and-ot-kevin-kumpf-on-securing-industrial-control-systems]]></link><guid isPermaLink="false">abe8e348-9d57-4a79-a6d2-43539df3433d</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 29 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/94ad26a0-dd7b-4b75-b66b-61bcad3d46a6/Kevin-Kumpf-Final.mp3" length="76435426" type="audio/mpeg"/><itunes:duration>31:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>71</itunes:episode><podcast:episode>71</podcast:episode></item><item><title>Cyber Threats, China, and the Global Wake-Up Call</title><itunes:title>Cyber Threats, China, and the Global Wake-Up Call</itunes:title><description><![CDATA[<p>Dino and Craig address the recent acknowledgment by China of their role in U.S. infrastructure hacks. They explore the urgent cybersecurity challenges facing industrial environments. </p><p>With rising geopolitical tensions, tariffs, the push to bring more manufacturing back to the U.S. and increasing attacks on critical infrastructure, the stakes have never been higher. </p><p>From end-of-life PLCs still running core operations, to the disconnect between IT and OT leadership, this conversation identifies the systemic gaps leaving industrial operations exposed. </p><p>They outline the pressing need for visibility, actionable incident response plans, and a cultural shift toward collaboration across the stack, from plant floor to the boardroom. </p><p>Whether you’re a CISO or an operations lead, this episode offers real-world insights, battle-tested perspectives, and one clear takeaway: in cybersecurity, doing nothing is no longer an option.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why IT-OT Unity Isn’t Optional Anymore</li><li>00:01:17 - Cyber Threats, China, and the Global Wake-Up Call</li><li>00:02:16 - CISA’s New Role: From Background Player to OT Ally</li><li>00:05:32 - Still Separate, Still Vulnerable: Why IT &amp; OT Must Sync Up</li><li>00:09:48 - Blind Spots Kill: Why Visibility Is the Real MVP</li><li>00:10:43 - Remote Access Realities and the Myth of the Air Gap</li><li>00:20:29 - Crisis Mode: Are You Ready for the Worst?</li><li>00:23:50 - Dino &amp; Craig’s Parting Shot: Do Something - Now</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino and Craig address the recent acknowledgment by China of their role in U.S. infrastructure hacks. They explore the urgent cybersecurity challenges facing industrial environments. </p><p>With rising geopolitical tensions, tariffs, the push to bring more manufacturing back to the U.S. and increasing attacks on critical infrastructure, the stakes have never been higher. </p><p>From end-of-life PLCs still running core operations, to the disconnect between IT and OT leadership, this conversation identifies the systemic gaps leaving industrial operations exposed. </p><p>They outline the pressing need for visibility, actionable incident response plans, and a cultural shift toward collaboration across the stack, from plant floor to the boardroom. </p><p>Whether you’re a CISO or an operations lead, this episode offers real-world insights, battle-tested perspectives, and one clear takeaway: in cybersecurity, doing nothing is no longer an option.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why IT-OT Unity Isn’t Optional Anymore</li><li>00:01:17 - Cyber Threats, China, and the Global Wake-Up Call</li><li>00:02:16 - CISA’s New Role: From Background Player to OT Ally</li><li>00:05:32 - Still Separate, Still Vulnerable: Why IT &amp; OT Must Sync Up</li><li>00:09:48 - Blind Spots Kill: Why Visibility Is the Real MVP</li><li>00:10:43 - Remote Access Realities and the Myth of the Air Gap</li><li>00:20:29 - Crisis Mode: Are You Ready for the Worst?</li><li>00:23:50 - Dino &amp; Craig’s Parting Shot: Do Something - Now</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cyber-threats-china-and-the-global-wake-up-call]]></link><guid isPermaLink="false">7600f454-2cd4-469c-a96d-ad027fe5162e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Thu, 24 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cadd6ab6-debd-4638-949e-59cfc82f4efd/ICSI-Dino-and-Craig.mp3" length="64957222" type="audio/mpeg"/><itunes:duration>27:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>70</itunes:episode><podcast:episode>70</podcast:episode></item><item><title>Zero Trust in OT: A Look Back at Lessons Across IT and OT</title><itunes:title>Zero Trust in OT: A Look Back at Lessons Across IT and OT</itunes:title><description><![CDATA[<p>In this special rewind episode, Dino Busalachi and Jim Cook address the messy but critical reality of implementing Zero Trust in operational technology (OT) environments. </p><p>Drawing from years of hands-on experience, they break down why traditional IT frameworks often fail on the plant floor, especially when facing flat OT networks, legacy assets, and limited change windows. </p><p>They introduce a "bucket approach" to segmenting and securing OT networks from the ground up. With real-world insights into asset inventory, process integrity, remote access challenges, and cross-functional collaboration, this episode is invaluable.</p><p>Whether you're a CISO, CTO, an OT engineer, or IT expert; this episode offers solid advice on navigating the convergence of IT and OT in complex industrial systems and environments.</p><p>Chapters:</p><ul><li>00:00:00 – Why Zero Trust Doesn’t Fit the Plant Floor (Yet)</li><li>00:00:45 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-it-versus-ot-dino-jim/" rel="noopener noreferrer" target="_blank">Zero Trust : IT versus OT with Dino Busalachi and Jim Cook</a></li><li>00:15:59 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-in-ot-adapting-its-playbook-for-enhanced-security/" rel="noopener noreferrer" target="_blank">Zero Trust in OT: Adapting IT's Playbook for Enhanced Security</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">Industrial Cybersecurity Insider</a></li><li><a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a> Cybersecurity Group Page</li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this special rewind episode, Dino Busalachi and Jim Cook address the messy but critical reality of implementing Zero Trust in operational technology (OT) environments. </p><p>Drawing from years of hands-on experience, they break down why traditional IT frameworks often fail on the plant floor, especially when facing flat OT networks, legacy assets, and limited change windows. </p><p>They introduce a "bucket approach" to segmenting and securing OT networks from the ground up. With real-world insights into asset inventory, process integrity, remote access challenges, and cross-functional collaboration, this episode is invaluable.</p><p>Whether you're a CISO, CTO, an OT engineer, or IT expert; this episode offers solid advice on navigating the convergence of IT and OT in complex industrial systems and environments.</p><p>Chapters:</p><ul><li>00:00:00 – Why Zero Trust Doesn’t Fit the Plant Floor (Yet)</li><li>00:00:45 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-it-versus-ot-dino-jim/" rel="noopener noreferrer" target="_blank">Zero Trust : IT versus OT with Dino Busalachi and Jim Cook</a></li><li>00:15:59 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-in-ot-adapting-its-playbook-for-enhanced-security/" rel="noopener noreferrer" target="_blank">Zero Trust in OT: Adapting IT's Playbook for Enhanced Security</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.linkedin.com/company/industrial-cybersecurity-insider" rel="noopener noreferrer" target="_blank">Industrial Cybersecurity Insider</a></li><li><a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a> Cybersecurity Group Page</li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-in-ot-lessons-that-still-hold-true]]></link><guid isPermaLink="false">3e8ce4da-20fb-4166-8dd5-ed239137d43d</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 15 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c451a8b2-04fc-4114-a7d2-4a0592752ceb/ICSI-Rewind-Final.mp3" length="75566071" type="audio/mpeg"/><itunes:duration>31:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>69</itunes:episode><podcast:episode>69</podcast:episode></item><item><title>Cybersecurity by Design: Building OT Security Into Your Manufacturing Plant Floor</title><itunes:title>Cybersecurity by Design: Building OT Security Into Your Manufacturing Plant Floor</itunes:title><description><![CDATA[<p>In this episode, Dino and Craig address the practicalities of building cyber resilience directly into manufacturing environments - rather than after the fact. </p><p>Using real-world analogies and field-tested insights, they break down why treating OT security like physical safety is crucial. </p><p>They challenge the outdated mindset of retrofitting cybersecurity protection after deployment of industrial plant floor equipment.</p><p>This episode covers all the key elements of protecting your plant floor. From the importance of designing cybersecurity upfront, to implementing the SANS 5 Critical Controls, specific to&nbsp;cybersecurity in operational technology (OT)&nbsp;environments. </p><p>Whether you're planning a greenfield build or managing legacy systems, this episode equips mid-to-senior leaders with actionable strategies to align IT and OT teams, boost visibility across XIoT assets, and future-proof operational environments in high-risk industries.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why Cybersecurity Can’t Be an Afterthought in Manufacturing</li><li>00:01:52 - Dino’s Five Must-Have OT Security Controls You Should Already Be Using</li><li>00:03:45 - When IT and OT Collide: Real Talk on Silos, Strategy, and Responsibility</li><li>00:06:08 - You Can’t Protect What You Can’t See: The Visibility Wake-Up Call</li><li>00:11:24 - Build It In, Don’t Bolt It On: Making Cybersecurity Part of the Machine</li><li>00:19:26 - Lost Docs and Retiring Experts: Managing Risk Across the Lifecycle</li><li>00:20:41 - Dino and Craig’s Final Word: Start Now, Start Smart—Security Is the New Safety</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Cybersecurity Insider </a><a href="https://www.linkedin.com/newsletters/cybersecurity-insider-7125213458987388928/" rel="noopener noreferrer" target="_blank">Newsletter</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino and Craig address the practicalities of building cyber resilience directly into manufacturing environments - rather than after the fact. </p><p>Using real-world analogies and field-tested insights, they break down why treating OT security like physical safety is crucial. </p><p>They challenge the outdated mindset of retrofitting cybersecurity protection after deployment of industrial plant floor equipment.</p><p>This episode covers all the key elements of protecting your plant floor. From the importance of designing cybersecurity upfront, to implementing the SANS 5 Critical Controls, specific to&nbsp;cybersecurity in operational technology (OT)&nbsp;environments. </p><p>Whether you're planning a greenfield build or managing legacy systems, this episode equips mid-to-senior leaders with actionable strategies to align IT and OT teams, boost visibility across XIoT assets, and future-proof operational environments in high-risk industries.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why Cybersecurity Can’t Be an Afterthought in Manufacturing</li><li>00:01:52 - Dino’s Five Must-Have OT Security Controls You Should Already Be Using</li><li>00:03:45 - When IT and OT Collide: Real Talk on Silos, Strategy, and Responsibility</li><li>00:06:08 - You Can’t Protect What You Can’t See: The Visibility Wake-Up Call</li><li>00:11:24 - Build It In, Don’t Bolt It On: Making Cybersecurity Part of the Machine</li><li>00:19:26 - Lost Docs and Retiring Experts: Managing Risk Across the Lifecycle</li><li>00:20:41 - Dino and Craig’s Final Word: Start Now, Start Smart—Security Is the New Safety</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Cybersecurity Insider </a><a href="https://www.linkedin.com/newsletters/cybersecurity-insider-7125213458987388928/" rel="noopener noreferrer" target="_blank">Newsletter</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-by-design-making-ot-security-non-negotiable]]></link><guid isPermaLink="false">11d7677f-9ff2-444e-8a07-e46594c84f09</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 08 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d90b2a60-42c3-4663-bd14-10e13397cb29/ICSI-Craig-and-Dino-Final.mp3" length="56640879" type="audio/mpeg"/><itunes:duration>23:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode></item><item><title>The CISO &amp; Talent Crisis: Turnover Meets OT Cybersecurity Gaps</title><itunes:title>The CISO &amp; Talent Crisis: Turnover Meets OT Cybersecurity Gaps</itunes:title><description><![CDATA[<p>In this episode, Dino and Craig dive deep into the disturbing talent exodus in cybersecurity. The discussion is sparked by Gartner’s prediction that 25% of cybersecurity professionals will leave the field in the next year. </p><p>They explore the growing gap between IT and OT teams, the lack of CISO influence in executive leadership, and the friction between cybersecurity goals and operational uptime. </p><p>With real-world anecdotes and hard-hitting insights, they unpack everything from rogue assets and malware in OT environments to the challenges of implementing EDR tools in live production lines. </p><p>Whether you're a CISO, CIO, or plant manager, this episode offers a candid look at the complex dynamics of securing industrial environments — and how collaboration is the only path forward.</p><p>Chapters:</p><ul><li>00:00:00 – Kicking Off with a Brutal Reality Check on Cybersecurity</li><li>00:01:06 – Gartner Says 25% of Cyber Pros Are Leaving — Here’s Why That Matters</li><li>00:03:15 – IT vs OT: The Culture Clash Still Killing Cyber Progress</li><li>00:09:35 – Why the Wrong Service Partner Could Be Your Biggest Risk</li><li>00:14:05 – Malware, Rogue Assets, and the Ugly Truth About Your Plant Floor</li><li>00:18:22 – Real Strategies for Fixing the IT/OT Disconnect (Without Killing Uptime)</li><li>00:24:06 – Stop Talking. Start Acting. What Cyber Leaders Need to Do Today</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity Insider <a href="https://www.linkedin.com/newsletters/cybersecurity-insider-7125213458987388928/" rel="noopener noreferrer" target="_blank">Newsletter</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino and Craig dive deep into the disturbing talent exodus in cybersecurity. The discussion is sparked by Gartner’s prediction that 25% of cybersecurity professionals will leave the field in the next year. </p><p>They explore the growing gap between IT and OT teams, the lack of CISO influence in executive leadership, and the friction between cybersecurity goals and operational uptime. </p><p>With real-world anecdotes and hard-hitting insights, they unpack everything from rogue assets and malware in OT environments to the challenges of implementing EDR tools in live production lines. </p><p>Whether you're a CISO, CIO, or plant manager, this episode offers a candid look at the complex dynamics of securing industrial environments — and how collaboration is the only path forward.</p><p>Chapters:</p><ul><li>00:00:00 – Kicking Off with a Brutal Reality Check on Cybersecurity</li><li>00:01:06 – Gartner Says 25% of Cyber Pros Are Leaving — Here’s Why That Matters</li><li>00:03:15 – IT vs OT: The Culture Clash Still Killing Cyber Progress</li><li>00:09:35 – Why the Wrong Service Partner Could Be Your Biggest Risk</li><li>00:14:05 – Malware, Rogue Assets, and the Ugly Truth About Your Plant Floor</li><li>00:18:22 – Real Strategies for Fixing the IT/OT Disconnect (Without Killing Uptime)</li><li>00:24:06 – Stop Talking. Start Acting. What Cyber Leaders Need to Do Today</li></ul><br/><p>Links And Resources:</p><ul><li>Industrial Cybersecurity Insider on <a href="https://www.linkedin.com/company/industrial-cybersecurity-insider/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity Insider <a href="https://www.linkedin.com/newsletters/cybersecurity-insider-7125213458987388928/" rel="noopener noreferrer" target="_blank">Newsletter</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-ciso-crisis-talent-turnover-meets-ot-cybersecurity-gaps]]></link><guid isPermaLink="false">d86dc4be-e700-49c8-bcc0-182b65f08cf1</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 01 Apr 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e9d599b9-a152-43c6-90d1-cbaf4dd4dda3/Dino-and-Craig-0401-Final.mp3" length="64023083" type="audio/mpeg"/><itunes:duration>26:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode></item><item><title>The #1 Myth Putting Your Industrial OT Assets at Risk</title><itunes:title>The #1 Myth Putting Your Industrial OT Assets at Risk</itunes:title><description><![CDATA[<p>In this episode, Dino and Craig tackle one of the most overlooked vulnerabilities in industrial cybersecurity: the unintentional chaos caused when IT security procedures are blindly applied to OT environments. </p><p>Using real-world examples like the CrowdStrike EDR failure, they illustrate how tools meant to protect can actually shut down production lines, cripple HMIs, and introduce massive operational risk. </p><p>They call out the air-gap myth, the need for shared authority between IT and OT, and the critical importance of context when deploying cybersecurity solutions on the plant floor. </p><p>For executives and practitioners alike, this episode is a wake-up call to rethink governance, accountability, and collaboration between traditionally siloed IT and OT teams.</p><p>Chapters:</p><ul><li>00:00:00 – IT vs. OT: The Unspoken War</li><li>00:01:03 – Meet Your Guides: Dino &amp; Craig</li><li>00:01:05 – IT/OT Explained… Without the Jargon</li><li>00:02:26 – How IT Crashed the Plant Floor</li><li>00:05:12 – Talk to Me Like I’m Production</li><li>00:08:53 – Security Priorities: Worlds Collide</li><li>00:13:40 – Vendors, Integrators &amp; Invisible Risks</li><li>00:21:52 – Who Owns the Fallout?</li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity &amp; Digital Safety Group on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino and Craig tackle one of the most overlooked vulnerabilities in industrial cybersecurity: the unintentional chaos caused when IT security procedures are blindly applied to OT environments. </p><p>Using real-world examples like the CrowdStrike EDR failure, they illustrate how tools meant to protect can actually shut down production lines, cripple HMIs, and introduce massive operational risk. </p><p>They call out the air-gap myth, the need for shared authority between IT and OT, and the critical importance of context when deploying cybersecurity solutions on the plant floor. </p><p>For executives and practitioners alike, this episode is a wake-up call to rethink governance, accountability, and collaboration between traditionally siloed IT and OT teams.</p><p>Chapters:</p><ul><li>00:00:00 – IT vs. OT: The Unspoken War</li><li>00:01:03 – Meet Your Guides: Dino &amp; Craig</li><li>00:01:05 – IT/OT Explained… Without the Jargon</li><li>00:02:26 – How IT Crashed the Plant Floor</li><li>00:05:12 – Talk to Me Like I’m Production</li><li>00:08:53 – Security Priorities: Worlds Collide</li><li>00:13:40 – Vendors, Integrators &amp; Invisible Risks</li><li>00:21:52 – Who Owns the Fallout?</li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity &amp; Digital Safety Group on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/air-gapped-no-more-the-myth-thats-risking-your-ot-assets]]></link><guid isPermaLink="false">c4bac890-f9f2-4a68-97bf-9486f5a68ca3</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 25 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fdf7e29d-68b1-47c0-8e6e-3e1b823160d7/Dino-and-Craig-0325-Final.mp3" length="59021156" type="audio/mpeg"/><itunes:duration>24:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode></item><item><title>Staying Ahead of an Industrial Cybersecurity Attack with Carlos Buenaño, Armis CTO</title><itunes:title>Staying Ahead of an Industrial Cybersecurity Attack with Carlos Buenaño, Armis CTO</itunes:title><description><![CDATA[<p>Dino Busalachi sits down with Carlos Buenaño, CTO of Armis, to explore the evolving cybersecurity challenges in industrial control systems (ICS) and operational technology (OT). </p><p>Carlos shares insights from his extensive experience in process control engineering, industrial network security, and IT-OT convergence. He sheds light on how organizations can gain visibility into their OT environments, mitigate cyber risks, and implement effective security frameworks. </p><p>From real-world ransomware incidents to strategies for network segmentation and asset monitoring, this discussion provides actionable insights for anyone involved in securing industrial infrastructure. </p><p>Whether you're a plant manager, security leader, or IT-OT strategist, this episode is packed with valuable takeaways.</p><p>Chapters:</p><ul><li>00:00:00 - The High-Stakes World of Plant Management and Control Systems</li><li>00:01:20 - Meet the Experts: Dino and Carlos on Industrial Cybersecurity</li><li>00:01:55 - From Engineer to CTO: Carlos’ Journey in Securing ICS</li><li>00:03:15 - Designing Secure Control Networks: Lessons from Australia</li><li>00:05:17 - IT vs. OT: Why the Security Approach Must Change</li><li>00:08:14 - Breaking Down IT-OT Conflicts and Finding Common Ground</li><li>00:13:52 - Hidden Cyber Threats in Industrial Control Systems</li><li>00:23:16 - How to Stay Ahead of Cyber Attacks in OT Environments</li><li>00:24:15 - Key Takeaways and Actionable Steps for Industrial Security</li></ul><br/><p>Links And Resources:</p><ul><li>Juan Carlos (Carlos) Buenaño on <a href="https://www.linkedin.com/in/juan-carlos-b-53bb00a/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety Group on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi sits down with Carlos Buenaño, CTO of Armis, to explore the evolving cybersecurity challenges in industrial control systems (ICS) and operational technology (OT). </p><p>Carlos shares insights from his extensive experience in process control engineering, industrial network security, and IT-OT convergence. He sheds light on how organizations can gain visibility into their OT environments, mitigate cyber risks, and implement effective security frameworks. </p><p>From real-world ransomware incidents to strategies for network segmentation and asset monitoring, this discussion provides actionable insights for anyone involved in securing industrial infrastructure. </p><p>Whether you're a plant manager, security leader, or IT-OT strategist, this episode is packed with valuable takeaways.</p><p>Chapters:</p><ul><li>00:00:00 - The High-Stakes World of Plant Management and Control Systems</li><li>00:01:20 - Meet the Experts: Dino and Carlos on Industrial Cybersecurity</li><li>00:01:55 - From Engineer to CTO: Carlos’ Journey in Securing ICS</li><li>00:03:15 - Designing Secure Control Networks: Lessons from Australia</li><li>00:05:17 - IT vs. OT: Why the Security Approach Must Change</li><li>00:08:14 - Breaking Down IT-OT Conflicts and Finding Common Ground</li><li>00:13:52 - Hidden Cyber Threats in Industrial Control Systems</li><li>00:23:16 - How to Stay Ahead of Cyber Attacks in OT Environments</li><li>00:24:15 - Key Takeaways and Actionable Steps for Industrial Security</li></ul><br/><p>Links And Resources:</p><ul><li>Juan Carlos (Carlos) Buenaño on <a href="https://www.linkedin.com/in/juan-carlos-b-53bb00a/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity &amp; Digital Safety Group on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/it-vs-ot-finding-the-right-balance-in-cybersecurity]]></link><guid isPermaLink="false">15dcd3a1-d54e-44c1-acbc-c7a4fce4e577</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Wed, 19 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/593dc583-8b5b-458e-b253-46919b57206b/ICSI-Carlos-CTO-Armis-Final-v2.mp3" length="72851426" type="audio/mpeg"/><itunes:duration>30:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode></item><item><title>Blind Spots in Industrial Cybersecurity: What False Confidence Could Cost You</title><itunes:title>Blind Spots in Industrial Cybersecurity: What False Confidence Could Cost You</itunes:title><description><![CDATA[<p>Organizations in the industrial sector continue to invest in cybersecurity, but are they truly secure, or just leaning on a false sense of comfort?</p><p>In this episode, industry experts Dino Busalachi and Craig Duckworth, dive into the dangerous gap between perception and reality when it comes to OT cybersecurity. </p><p>They discuss real-world challenges, from blind spots in asset visibility to leadership misalignment and third-party risks. </p><p>With a focus on practical steps, they explore why security frameworks must go beyond IT, how to align business needs with security, and why treating cybersecurity like safety is essential.</p><p>This episode is a must-listen for anyone serious about protecting their industrial environments.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?</li><li>00:00:47 - A Quick Timeout: NCAA Madness Before Cyber Madness</li><li>00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?</li><li>00:01:45 - The Hidden Challenges Holding OT Security Back</li><li>00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security</li><li>00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?</li><li>00:06:15 - The Dangerous Myth of “Isolated” OT Systems</li><li>00:07:58 - From Theory to Action: Winning Strategies for OT Security</li><li>00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?</li><li>00:19:55 - No More Blind Spots: Key Takeaways for a Secure Future</li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn Group</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Organizations in the industrial sector continue to invest in cybersecurity, but are they truly secure, or just leaning on a false sense of comfort?</p><p>In this episode, industry experts Dino Busalachi and Craig Duckworth, dive into the dangerous gap between perception and reality when it comes to OT cybersecurity. </p><p>They discuss real-world challenges, from blind spots in asset visibility to leadership misalignment and third-party risks. </p><p>With a focus on practical steps, they explore why security frameworks must go beyond IT, how to align business needs with security, and why treating cybersecurity like safety is essential.</p><p>This episode is a must-listen for anyone serious about protecting their industrial environments.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Are You Truly Secure or Just Comfortable?</li><li>00:00:47 - A Quick Timeout: NCAA Madness Before Cyber Madness</li><li>00:01:15 - OT Security Reality Check: Do You Really Know Your Risks?</li><li>00:01:45 - The Hidden Challenges Holding OT Security Back</li><li>00:03:15 - Lack of Skilled Resources: The Biggest Barrier to Security</li><li>00:05:30 - Security Frameworks: Are They Reaching the Plant Floor?</li><li>00:06:15 - The Dangerous Myth of “Isolated” OT Systems</li><li>00:07:58 - From Theory to Action: Winning Strategies for OT Security</li><li>00:12:13 - Leadership’s Role in Cybersecurity: Who’s Driving the Change?</li><li>00:19:55 - No More Blind Spots: Key Takeaways for a Secure Future</li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn Group</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ot-security-why-good-intentions-wont-stop-a-breach]]></link><guid isPermaLink="false">3cc5d314-d4c8-45c3-ae34-b6767c14d2b5</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Thu, 13 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e6983a55-916c-45b8-90ec-43e31bc84598/Dino-and-Craig-03-13-Final.mp3" length="55366103" type="audio/mpeg"/><itunes:duration>23:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode></item><item><title>Avoiding Compliance Risks : From Audit to Action</title><itunes:title>Avoiding Compliance Risks : From Audit to Action</itunes:title><description><![CDATA[<p>Industrial cybersecurity is no longer an option—it’s a necessity.&nbsp;</p><p>In this episode, Kimberly Anderson, Managing Director at UHY, joins Craig Duckworth to explore the growing cybersecurity challenges facing manufacturers and industrial operations.&nbsp;</p><p>They discuss the gaps in cybersecurity accountability, IT/OT entanglement, and why network segregation is still a major hurdle.&nbsp;</p><p>Kimberly shares insights on cyber insurance pitfalls, compliance best practices, and why businesses should move beyond "checking the box" to build a truly resilient cybersecurity program.&nbsp;</p><p>Whether you're facing vendor or OEM remote access risks, securing legacy systems, or navigating industrial cybersecurity regulations, this conversation provides actionable insights to help you stay in compliance and ahead of common cybersecurity pitfalls.</p><p>Chapters:</p><ul><li>00:00:00 - Ransomware Isn’t Your Biggest Threat—Human Error Is</li><li>00:00:44 - Meet Kimberly Anderson: From Chemistry to Cybersecurity Leadership</li><li>00:01:17 - Why Technology Risk &amp; Compliance Can’t Be Ignored in Industrial Cybersecurity</li><li>00:02:29 - IT/OT Security Integration: Why It’s a Struggle and How to Get It Right</li><li>00:03:56 - Network Segregation: The Critical Security Step Most Companies Overlook</li><li>00:05:42 - The IT/OT “Divorce”: Why Separating Networks is a Game-Changer</li><li>00:06:41 - Rushing to the Cloud? Avoid These Vendor Security Pitfalls</li><li>00:11:48 - Cyber Insurance Isn’t a Safety Net—Here’s What You’re Missing</li><li>00:14:43 - Beyond “Checking the Box”: How to Build a Resilient Cybersecurity Strategy</li><li>00:18:25 - Final Takeaways: Simple Steps to Strengthen Your Security Today</li></ul><br/><p>Links And Resources:</p><ul><li>Kimberly Anderson on <a href="https://www.linkedin.com/in/kimberly-l-anderson/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://uhy-us.com" rel="noopener noreferrer" target="_blank">UHY Advisors, Inc.</a></li><li>Industrial Cybersecurity <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn Group</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Industrial cybersecurity is no longer an option—it’s a necessity.&nbsp;</p><p>In this episode, Kimberly Anderson, Managing Director at UHY, joins Craig Duckworth to explore the growing cybersecurity challenges facing manufacturers and industrial operations.&nbsp;</p><p>They discuss the gaps in cybersecurity accountability, IT/OT entanglement, and why network segregation is still a major hurdle.&nbsp;</p><p>Kimberly shares insights on cyber insurance pitfalls, compliance best practices, and why businesses should move beyond "checking the box" to build a truly resilient cybersecurity program.&nbsp;</p><p>Whether you're facing vendor or OEM remote access risks, securing legacy systems, or navigating industrial cybersecurity regulations, this conversation provides actionable insights to help you stay in compliance and ahead of common cybersecurity pitfalls.</p><p>Chapters:</p><ul><li>00:00:00 - Ransomware Isn’t Your Biggest Threat—Human Error Is</li><li>00:00:44 - Meet Kimberly Anderson: From Chemistry to Cybersecurity Leadership</li><li>00:01:17 - Why Technology Risk &amp; Compliance Can’t Be Ignored in Industrial Cybersecurity</li><li>00:02:29 - IT/OT Security Integration: Why It’s a Struggle and How to Get It Right</li><li>00:03:56 - Network Segregation: The Critical Security Step Most Companies Overlook</li><li>00:05:42 - The IT/OT “Divorce”: Why Separating Networks is a Game-Changer</li><li>00:06:41 - Rushing to the Cloud? Avoid These Vendor Security Pitfalls</li><li>00:11:48 - Cyber Insurance Isn’t a Safety Net—Here’s What You’re Missing</li><li>00:14:43 - Beyond “Checking the Box”: How to Build a Resilient Cybersecurity Strategy</li><li>00:18:25 - Final Takeaways: Simple Steps to Strengthen Your Security Today</li></ul><br/><p>Links And Resources:</p><ul><li>Kimberly Anderson on <a href="https://www.linkedin.com/in/kimberly-l-anderson/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://uhy-us.com" rel="noopener noreferrer" target="_blank">UHY Advisors, Inc.</a></li><li>Industrial Cybersecurity <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn Group</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cyber-maturity-compliance-preparing-for-the-future-of-industrial-security]]></link><guid isPermaLink="false">7ba03f07-d5cc-478c-9379-cc3ce0f0a5d9</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 04 Mar 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e0c12c23-2180-42b3-8785-7c0e7b4dfccf/ICSI-Kimberly-Anderson-UHY.mp3" length="56647148" type="audio/mpeg"/><itunes:duration>23:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode></item><item><title>Gartner, DOGE, and the Future of OT Cybersecurity Policy</title><itunes:title>Gartner, DOGE, and the Future of OT Cybersecurity Policy</itunes:title><description><![CDATA[<p>In this episode, we dive into the latest Gartner Magic Quadrant report for OT cybersecurity and analyze key players, market trends, and strategies for selecting the right security partners.</p><p>We also discuss insights from the recent S4 conference, the growing importance of cyber-informed engineering, and how organizations can effectively align IT and OT security strategies. </p><p>We discuss CapEx versus OpEx and potential implications of the DOGE initiative around industrial cybersecurity investments.</p><p>Whether you're planning your next cybersecurity investment or tackling legacy system challenges, this episode provides practical guidance to help you navigate the OT security landscape.</p><p>Chapters:</p><ul><li>00:00:00 -Think Globally, Secure Locally: Crafting an Effective OT Cyber Strategy</li><li>00:00:31 -Meet Dino &amp; Craig: Cybersecurity Pros with Real-World OT Experience</li><li>00:01:03 -Cybersecurity Headlines That Matter: What’s Shaping OT Security Today</li><li>00:02:20 -Gartner’s Magic Quadrant Revealed: Who’s Leading OT Cybersecurity?</li><li>00:03:08 -Why OT Teams Hold the Key to Cybersecurity Success</li><li>00:04:24 -Your OT Ecosystem is Bigger Than You Think—Here’s Why That Matters</li><li>00:05:08 -S4 Conference Takeaways: The Future of Secure-By-Design Machines</li><li>00:11:39 -CapEx vs. OpEx: Smart Budgeting for OT Cybersecurity Investments</li><li>00:19:08 -AI, Onshoring, and the Next Big Shifts in Industrial Cybersecurity</li><li>00:20:50 -IT vs. OT? No—IT &amp; OT: How to Bridge the Divide for Better Security</li><li>00:23:02 -Final Insights: The Must-Know Takeaways for Securing Your OT Environment</li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity Group Page on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, we dive into the latest Gartner Magic Quadrant report for OT cybersecurity and analyze key players, market trends, and strategies for selecting the right security partners.</p><p>We also discuss insights from the recent S4 conference, the growing importance of cyber-informed engineering, and how organizations can effectively align IT and OT security strategies. </p><p>We discuss CapEx versus OpEx and potential implications of the DOGE initiative around industrial cybersecurity investments.</p><p>Whether you're planning your next cybersecurity investment or tackling legacy system challenges, this episode provides practical guidance to help you navigate the OT security landscape.</p><p>Chapters:</p><ul><li>00:00:00 -Think Globally, Secure Locally: Crafting an Effective OT Cyber Strategy</li><li>00:00:31 -Meet Dino &amp; Craig: Cybersecurity Pros with Real-World OT Experience</li><li>00:01:03 -Cybersecurity Headlines That Matter: What’s Shaping OT Security Today</li><li>00:02:20 -Gartner’s Magic Quadrant Revealed: Who’s Leading OT Cybersecurity?</li><li>00:03:08 -Why OT Teams Hold the Key to Cybersecurity Success</li><li>00:04:24 -Your OT Ecosystem is Bigger Than You Think—Here’s Why That Matters</li><li>00:05:08 -S4 Conference Takeaways: The Future of Secure-By-Design Machines</li><li>00:11:39 -CapEx vs. OpEx: Smart Budgeting for OT Cybersecurity Investments</li><li>00:19:08 -AI, Onshoring, and the Next Big Shifts in Industrial Cybersecurity</li><li>00:20:50 -IT vs. OT? No—IT &amp; OT: How to Bridge the Divide for Better Security</li><li>00:23:02 -Final Insights: The Must-Know Takeaways for Securing Your OT Environment</li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity Group Page on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/doj-regulations-and-the-future-of-ot-cybersecurity-policy]]></link><guid isPermaLink="false">9ab2b514-2830-43c5-9853-cfaef135e058</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 25 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/2422e405-1bb6-41f4-b669-16069c418139/Dino-and-Craig-02-25-Final.mp3" length="57941777" type="audio/mpeg"/><itunes:duration>24:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode></item><item><title>Assessing AI’s Role in Cybersecurity</title><itunes:title>Assessing AI’s Role in Cybersecurity</itunes:title><description><![CDATA[<p>The rapid evolution of AI is reshaping industrial cybersecurity, but are organizations ready for the risks? </p><p>In this episode, three different experts explore the complexities of securing OT environments, the rising role of AI in threat detection, and the challenges of integrating IT and OT security. </p><p>From governance and compliance to workforce development and emerging cyber threats, this discussion sheds light on the shifting cybersecurity landscape. </p><p>Gain insights into the future of industrial security, the impact of AI-driven decision-making, and the importance of balancing innovation with risk management.</p><p>Chapters:</p><ul><li>00:00:00 - Diving into AI’s evolving role in industrial cybersecurity—threats, solutions, and what’s next</li><li>00:00:43 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-gary-kneeland/" rel="noopener noreferrer" target="_blank">AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty</a></li><li>00:5:16 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/ai-in-industrial-cybersecurity-friend-foe-or-something-in-between/" rel="noopener noreferrer" target="_blank">AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?</a></li><li>00:10:58 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-roger-hill/" rel="noopener noreferrer" target="_blank">From Legacy Systems to Ransomware: The Evolution of OT Cybersecurity</a></li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity Group Page on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>The rapid evolution of AI is reshaping industrial cybersecurity, but are organizations ready for the risks? </p><p>In this episode, three different experts explore the complexities of securing OT environments, the rising role of AI in threat detection, and the challenges of integrating IT and OT security. </p><p>From governance and compliance to workforce development and emerging cyber threats, this discussion sheds light on the shifting cybersecurity landscape. </p><p>Gain insights into the future of industrial security, the impact of AI-driven decision-making, and the importance of balancing innovation with risk management.</p><p>Chapters:</p><ul><li>00:00:00 - Diving into AI’s evolving role in industrial cybersecurity—threats, solutions, and what’s next</li><li>00:00:43 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-gary-kneeland/" rel="noopener noreferrer" target="_blank">AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty</a></li><li>00:5:16 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/ai-in-industrial-cybersecurity-friend-foe-or-something-in-between/" rel="noopener noreferrer" target="_blank">AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?</a></li><li>00:10:58 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/with-roger-hill/" rel="noopener noreferrer" target="_blank">From Legacy Systems to Ransomware: The Evolution of OT Cybersecurity</a></li></ul><br/><p>Links And Resources:</p><ul><li>Cybersecurity Group Page on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/looking-back-at-ais-role-in-cybersecurity-this-year]]></link><guid isPermaLink="false">ce77d423-0413-4adf-bde4-7158ca493ce3</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 18 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/20efb8e8-68ab-4e9b-ae3b-21f890c37111/ICSI-Rewind-Episode-V2.mp3" length="56152912" type="audio/mpeg"/><itunes:duration>23:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode></item><item><title>Overlooked Risks With IIoT in Industrial Cybersecurity</title><itunes:title>Overlooked Risks With IIoT in Industrial Cybersecurity</itunes:title><description><![CDATA[<p>Craig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT.&nbsp;</p><p>They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable.&nbsp;</p><p>The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden risks posed by vendor access, remote connections, and unmonitored network traffic.&nbsp;</p><p>With real-world insights, they explore how organizations can leverage cybersecurity tools not just for threat prevention but also for process integrity and operational efficiency.&nbsp;</p><p>If you’ve ever wondered how to bridge the gap between IT-driven cybersecurity and OT-focused operations, this episode is a must-listen.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: Why OT Security Matters More Than You Think</li><li>00:01:08 - Meet Craig and Dino: Experts in Industrial Cybersecurity</li><li>00:01:16 - Breaking Down IoT vs. OT: Understanding the Differences</li><li>00:02:33 - Why Asset Inventory in Industrial Environments is a Challenge</li><li>00:03:42 - The Hidden Risks of Overlooking Connected OT Assets</li><li>00:04:32 - The IT-OT Divide: Why Collaboration is Crucial for Security</li><li>00:08:29 - Industrial IoT Blind Spots: What You’re Missing</li><li>00:09:08 - Preventing Downtime: How Cybersecurity Tools Can Help</li><li>00:12:00 - How Sensors and Data Can Predict and Prevent Failures</li><li>00:14:20 - Digital Threats to OT: Why Anomalies Matter</li><li>00:16:42 - Why OT Teams Need to Fully Understand Cybersecurity Tools</li><li>00:19:13 - Finding the Right Partner for IT-OT Cybersecurity Integration</li><li>00:20:04 - Bridging the Gap: Building Stronger IT and OT Relationships</li><li>00:21:07 - Final Thoughts: How to Take Action on OT Security Today</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino dive deep into the critical yet often overlooked aspects of industrial cybersecurity in relation to IIoT.&nbsp;</p><p>They discuss the misconception that many OT assets are isolated when, in reality, they are interconnected and vulnerable.&nbsp;</p><p>The conversation highlights the importance of complete asset inventory, IT-OT collaboration, and the hidden risks posed by vendor access, remote connections, and unmonitored network traffic.&nbsp;</p><p>With real-world insights, they explore how organizations can leverage cybersecurity tools not just for threat prevention but also for process integrity and operational efficiency.&nbsp;</p><p>If you’ve ever wondered how to bridge the gap between IT-driven cybersecurity and OT-focused operations, this episode is a must-listen.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: Why OT Security Matters More Than You Think</li><li>00:01:08 - Meet Craig and Dino: Experts in Industrial Cybersecurity</li><li>00:01:16 - Breaking Down IoT vs. OT: Understanding the Differences</li><li>00:02:33 - Why Asset Inventory in Industrial Environments is a Challenge</li><li>00:03:42 - The Hidden Risks of Overlooking Connected OT Assets</li><li>00:04:32 - The IT-OT Divide: Why Collaboration is Crucial for Security</li><li>00:08:29 - Industrial IoT Blind Spots: What You’re Missing</li><li>00:09:08 - Preventing Downtime: How Cybersecurity Tools Can Help</li><li>00:12:00 - How Sensors and Data Can Predict and Prevent Failures</li><li>00:14:20 - Digital Threats to OT: Why Anomalies Matter</li><li>00:16:42 - Why OT Teams Need to Fully Understand Cybersecurity Tools</li><li>00:19:13 - Finding the Right Partner for IT-OT Cybersecurity Integration</li><li>00:20:04 - Bridging the Gap: Building Stronger IT and OT Relationships</li><li>00:21:07 - Final Thoughts: How to Take Action on OT Security Today</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/beyond-cybersecurity-process-integrity-in-industrial-operations]]></link><guid isPermaLink="false">c3135570-51d3-4eab-bb54-abccdba03d89</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 11 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a48c538d-a5ff-4bf3-a6b1-0eac5247564e/ICSI-Dino-and-Criag-0211-Final.mp3" length="54673336" type="audio/mpeg"/><itunes:duration>22:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode></item><item><title>How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks</title><itunes:title>How to Secure OT Environments Without Disruptions with Dan Cartmill, TXOne Networks</itunes:title><description><![CDATA[<p>The cybersecurity challenges of industrial environments are unique and complex, requiring a shift in mindset from traditional IT security strategies. </p><p>Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, joins Dino Busalachi for this episode. They discuss the critical divide between IT and OT security, why collaboration is essential, and how organizations can take the first steps toward securing their industrial control systems (ICS). </p><p>Drawing from his experience in the Royal Australian Navy, IT security, and product marketing, Dan shares key insights on the operational risks of cybersecurity tools, the importance of ownership in security decisions, and why companies must move beyond fear-based approaches to focus on practical, incremental solutions. </p><p>If your organization struggles with securing legacy systems, aligning IT and OT teams, or justifying cybersecurity investments, this episode offers real-world strategies and actionable takeaways.</p><p>Chapters:</p><ul><li>00:00:00 - The First Step to Securing OT: Why You Can’t Afford to Wait</li><li>00:01:00 - Meet Dino and Dan: A Conversation on Industrial Cybersecurity</li><li>00:01:51 - From the Navy to Cybersecurity: Dan’s Journey into Protecting Industrial Systems</li><li>00:05:30 - The Biggest Cybersecurity Challenges Facing Industrial Environments Today</li><li>00:09:00 - IT vs. OT: Who Owns Cybersecurity and Why It Matters</li><li>00:14:01 - Breaking Down Silos: How Collaboration Can Make or Break Your Security Strategy</li><li>00:22:35 - Cybersecurity is a Team Sport: How the Right Partners Can Make All the Difference</li><li>00:25:00 - Think Globally, Act Locally: Why OT Security Must Be Customized for Each Plant</li><li>00:29:15 - Who Owns OT Security? Why IT and OT Leaders Need a Unified Strategy</li><li>00:33:00 - The Power of Collaboration: Bringing IT, OT, and Vendors to the Same Table</li><li>00:36:10 - The Cost of Cybersecurity: Why Companies Struggle to Justify OT Security Investments</li><li>00:38:45 - Legacy Systems &amp; Cyber Risk: Why Ignoring the Problem is Not an Option</li><li>00:40:53 - The Takeaway: Why Action Beats Perfection in OT Security</li></ul><br/><p>Links And Resources:</p><ul><li>Dan Cartmill on <a href="https://www.linkedin.com/in/dancartmill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.txone.com/" rel="noopener noreferrer" target="_blank">TXOne Networks</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>The cybersecurity challenges of industrial environments are unique and complex, requiring a shift in mindset from traditional IT security strategies. </p><p>Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, joins Dino Busalachi for this episode. They discuss the critical divide between IT and OT security, why collaboration is essential, and how organizations can take the first steps toward securing their industrial control systems (ICS). </p><p>Drawing from his experience in the Royal Australian Navy, IT security, and product marketing, Dan shares key insights on the operational risks of cybersecurity tools, the importance of ownership in security decisions, and why companies must move beyond fear-based approaches to focus on practical, incremental solutions. </p><p>If your organization struggles with securing legacy systems, aligning IT and OT teams, or justifying cybersecurity investments, this episode offers real-world strategies and actionable takeaways.</p><p>Chapters:</p><ul><li>00:00:00 - The First Step to Securing OT: Why You Can’t Afford to Wait</li><li>00:01:00 - Meet Dino and Dan: A Conversation on Industrial Cybersecurity</li><li>00:01:51 - From the Navy to Cybersecurity: Dan’s Journey into Protecting Industrial Systems</li><li>00:05:30 - The Biggest Cybersecurity Challenges Facing Industrial Environments Today</li><li>00:09:00 - IT vs. OT: Who Owns Cybersecurity and Why It Matters</li><li>00:14:01 - Breaking Down Silos: How Collaboration Can Make or Break Your Security Strategy</li><li>00:22:35 - Cybersecurity is a Team Sport: How the Right Partners Can Make All the Difference</li><li>00:25:00 - Think Globally, Act Locally: Why OT Security Must Be Customized for Each Plant</li><li>00:29:15 - Who Owns OT Security? Why IT and OT Leaders Need a Unified Strategy</li><li>00:33:00 - The Power of Collaboration: Bringing IT, OT, and Vendors to the Same Table</li><li>00:36:10 - The Cost of Cybersecurity: Why Companies Struggle to Justify OT Security Investments</li><li>00:38:45 - Legacy Systems &amp; Cyber Risk: Why Ignoring the Problem is Not an Option</li><li>00:40:53 - The Takeaway: Why Action Beats Perfection in OT Security</li></ul><br/><p>Links And Resources:</p><ul><li>Dan Cartmill on <a href="https://www.linkedin.com/in/dancartmill/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.txone.com/" rel="noopener noreferrer" target="_blank">TXOne Networks</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/working-on-shownotes]]></link><guid isPermaLink="false">a15cf3d1-0f27-4508-8efd-628fd5766152</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 04 Feb 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c99f38bf-be7f-451a-8fce-467101509f71/Dan-Cartmill-Final.mp3" length="100762740" type="audio/mpeg"/><itunes:duration>41:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode></item><item><title>The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort</title><itunes:title>The A-Z of Industrial Cybersecurity for OT Environments with Industry Expert Bryson Bort</itunes:title><description><![CDATA[<p>Join us as we delve into the fascinating world of operational technology (OT) cybersecurity with Bryson Bort, founder of SCYTHE, Grimm, and co-founder of ICS Village.</p><p>&nbsp;Discover how his experiences shaped innovative approaches to OT risk management, why visibility and architecture are foundational to security, and the importance of building trust between IT and OT teams.&nbsp;</p><p>From real-world case studies to actionable strategies, this episode explores the evolving landscape of industrial cybersecurity and the steps organizations must take to stay ahead.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome and introduction to today’s focus on industrial cybersecurity</li><li>00:01:10 - Bryson Bort shares his journey from military service to OT security innovation</li><li>00:02:02 - The evolution of cybersecurity: milestones and lessons for OT environments</li><li>00:03:21 - Exploring industrial control systems and the roots of car hacking</li><li>00:06:52 - Tackling real-world challenges in industrial cybersecurity</li><li>00:08:00 - Why visibility and architecture are foundational for OT security</li><li>00:09:30 - Dispelling misconceptions about air-gapped systems in OT environments</li><li>00:11:10 - Practical insights on segmentation and defensible architectures</li><li>00:13:00 - How attackers exploit vulnerabilities and why monitoring is essential</li><li>00:14:30 - Building trust between IT and OT teams for successful convergence</li><li>00:16:00 - Leveraging purple teaming to enhance collaboration and resilience</li><li>00:17:07 - Strategies for building trust and creating effective OT security solutions</li><li>00:26:54 - The future of cybersecurity and Bryson’s parting insights</li></ul><br/><p>Links And Resources:</p><ul><li>Bryson Bort on <a href="https://www.linkedin.com/in/brysonbort/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://scythe.io/" rel="noopener noreferrer" target="_blank">SCYTHE</a></li><li><a href="https://www.icsvillage.com/" rel="noopener noreferrer" target="_blank">ICS Village</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Join us as we delve into the fascinating world of operational technology (OT) cybersecurity with Bryson Bort, founder of SCYTHE, Grimm, and co-founder of ICS Village.</p><p>&nbsp;Discover how his experiences shaped innovative approaches to OT risk management, why visibility and architecture are foundational to security, and the importance of building trust between IT and OT teams.&nbsp;</p><p>From real-world case studies to actionable strategies, this episode explores the evolving landscape of industrial cybersecurity and the steps organizations must take to stay ahead.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome and introduction to today’s focus on industrial cybersecurity</li><li>00:01:10 - Bryson Bort shares his journey from military service to OT security innovation</li><li>00:02:02 - The evolution of cybersecurity: milestones and lessons for OT environments</li><li>00:03:21 - Exploring industrial control systems and the roots of car hacking</li><li>00:06:52 - Tackling real-world challenges in industrial cybersecurity</li><li>00:08:00 - Why visibility and architecture are foundational for OT security</li><li>00:09:30 - Dispelling misconceptions about air-gapped systems in OT environments</li><li>00:11:10 - Practical insights on segmentation and defensible architectures</li><li>00:13:00 - How attackers exploit vulnerabilities and why monitoring is essential</li><li>00:14:30 - Building trust between IT and OT teams for successful convergence</li><li>00:16:00 - Leveraging purple teaming to enhance collaboration and resilience</li><li>00:17:07 - Strategies for building trust and creating effective OT security solutions</li><li>00:26:54 - The future of cybersecurity and Bryson’s parting insights</li></ul><br/><p>Links And Resources:</p><ul><li>Bryson Bort on <a href="https://www.linkedin.com/in/brysonbort/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://scythe.io/" rel="noopener noreferrer" target="_blank">SCYTHE</a></li><li><a href="https://www.icsvillage.com/" rel="noopener noreferrer" target="_blank">ICS Village</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/what-every-plant-manager-needs-to-know-about-cybersecurity]]></link><guid isPermaLink="false">f19a76f0-b42a-4dcc-b64b-bd1474625e3c</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 28 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/477fc99d-5b9e-47b4-a63a-7adf9f4e8572/ICSI-Bryson-Bort-Final.mp3" length="79382038" type="audio/mpeg"/><itunes:duration>33:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode></item><item><title>Uncovering Blind Spots in OT Cybersecurity</title><itunes:title>Uncovering Blind Spots in OT Cybersecurity</itunes:title><description><![CDATA[<p>In this week's episode, Craig Duckworth and Dino Busalachi address common blindspots that challenge industrial cybersecurity. </p><p>They explore the hidden vulnerabilities within operational technology (OT) environments, the limitations of traditional IT approaches in industrial settings, and the critical importance of asset visibility. </p><p>With a focus on actionable strategies, they advocate for secure-by-design principles, cross-functional partnerships, and tailored solutions to address the dynamic and diverse nature of OT systems. </p><p>This discussion is essential for anyone seeking to navigate the complexities of cybersecurity in industrial environments while ensuring operational continuity.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: The Challenges and Importance of Industrial Cybersecurity</li><li>00:01:14 - Mapping the Threat Landscape: Hidden Risks in OT Environments</li><li>00:01:35 - Understanding Traffic Patterns: North-South vs. East-West Communication</li><li>00:02:15 - IT vs. OT Roles: Defining Responsibilities in Cybersecurity</li><li>00:03:10 - Visibility Challenges: Identifying Blind Spots in Industrial Assets</li><li>00:06:00 - Asset Ownership: Who’s Responsible for Securing OT Systems?</li><li>00:09:46 - Remote Access Risks: Why VPNs Aren’t Always the Right Solution</li><li>00:18:46 - Continuous Monitoring: Moving Beyond Static Assessments</li><li>00:21:12 - Collaboration for Success: Building Effective IT-OT Partnerships</li><li>00:26:15 - Takeaways and Next Steps: Recommendations for Industrial Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Craig Duckworth and Dino Busalachi address common blindspots that challenge industrial cybersecurity. </p><p>They explore the hidden vulnerabilities within operational technology (OT) environments, the limitations of traditional IT approaches in industrial settings, and the critical importance of asset visibility. </p><p>With a focus on actionable strategies, they advocate for secure-by-design principles, cross-functional partnerships, and tailored solutions to address the dynamic and diverse nature of OT systems. </p><p>This discussion is essential for anyone seeking to navigate the complexities of cybersecurity in industrial environments while ensuring operational continuity.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: The Challenges and Importance of Industrial Cybersecurity</li><li>00:01:14 - Mapping the Threat Landscape: Hidden Risks in OT Environments</li><li>00:01:35 - Understanding Traffic Patterns: North-South vs. East-West Communication</li><li>00:02:15 - IT vs. OT Roles: Defining Responsibilities in Cybersecurity</li><li>00:03:10 - Visibility Challenges: Identifying Blind Spots in Industrial Assets</li><li>00:06:00 - Asset Ownership: Who’s Responsible for Securing OT Systems?</li><li>00:09:46 - Remote Access Risks: Why VPNs Aren’t Always the Right Solution</li><li>00:18:46 - Continuous Monitoring: Moving Beyond Static Assessments</li><li>00:21:12 - Collaboration for Success: Building Effective IT-OT Partnerships</li><li>00:26:15 - Takeaways and Next Steps: Recommendations for Industrial Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/why-vpns-are-not-the-answer-for-ot-access]]></link><guid isPermaLink="false">6c0bdad8-889b-4652-94c0-f0e1e20427cf</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 21 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d44a2410-4857-4913-9fa8-9844c766b97e/Dino-and-Craig-01-21-Final.mp3" length="70034381" type="audio/mpeg"/><itunes:duration>29:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode></item><item><title>AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?</title><itunes:title>AI in Industrial Cybersecurity: Friend, Foe, or Something in Between?</itunes:title><description><![CDATA[<p>Join us for an in-depth exploration of industrial cybersecurity with expert and Emmy award-winning reporter Kerry Tomlinson, who focuses on cybersecurity, Kerry Tomlinson. </p><p>Discover practical strategies to combat today’s most critical threats, from navigating AI vulnerabilities to addressing ethical dilemmas around safety and profit. </p><p>Kerry underscores the essential role of human involvement and cultural alignment in fostering cyber resilience. </p><p>Learn why foundational practices—like asset inventories and prioritized action plans—are crucial, and how organizations can stay ahead in an ever-evolving threat landscape while building a culture of digital safety.</p><p>Chapters:</p><ul><li>00:00:00 - Unmasking Cyber Risks: How Human Actions Shape Security</li><li>00:00:45 - Meet Kerry Tomlinson: Cybersecurity Storyteller and Strategist</li><li>00:02:16 - Simplifying Cyber Layers: From Personal to Industrial Defense</li><li>00:03:51 - Overcoming Industrial Cybersecurity Challenges</li><li>00:04:51 - Facing Threats Head-On: Lessons from Real-World Attacks</li><li>00:14:25 - AI in the Spotlight: Opportunities and Dangers in Cybersecurity</li><li>00:17:20 - Back to Basics: Essential Practices for Cyber Resilience</li><li>00:21:10 - Humans at the Core: Why Culture Matters in Cybersecurity</li><li>00:26:24 - Final Insights: Building a Safer Digital Future Together</li></ul><br/><p>Links And Resources:</p><ul><li>Kerry Tomlinson on <a href="https://www.linkedin.com/in/kerry-tomlinson-6131b8110/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity Group on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Join us for an in-depth exploration of industrial cybersecurity with expert and Emmy award-winning reporter Kerry Tomlinson, who focuses on cybersecurity, Kerry Tomlinson. </p><p>Discover practical strategies to combat today’s most critical threats, from navigating AI vulnerabilities to addressing ethical dilemmas around safety and profit. </p><p>Kerry underscores the essential role of human involvement and cultural alignment in fostering cyber resilience. </p><p>Learn why foundational practices—like asset inventories and prioritized action plans—are crucial, and how organizations can stay ahead in an ever-evolving threat landscape while building a culture of digital safety.</p><p>Chapters:</p><ul><li>00:00:00 - Unmasking Cyber Risks: How Human Actions Shape Security</li><li>00:00:45 - Meet Kerry Tomlinson: Cybersecurity Storyteller and Strategist</li><li>00:02:16 - Simplifying Cyber Layers: From Personal to Industrial Defense</li><li>00:03:51 - Overcoming Industrial Cybersecurity Challenges</li><li>00:04:51 - Facing Threats Head-On: Lessons from Real-World Attacks</li><li>00:14:25 - AI in the Spotlight: Opportunities and Dangers in Cybersecurity</li><li>00:17:20 - Back to Basics: Essential Practices for Cyber Resilience</li><li>00:21:10 - Humans at the Core: Why Culture Matters in Cybersecurity</li><li>00:26:24 - Final Insights: Building a Safer Digital Future Together</li></ul><br/><p>Links And Resources:</p><ul><li>Kerry Tomlinson on <a href="https://www.linkedin.com/in/kerry-tomlinson-6131b8110/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Cybersecurity Group on <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ai-in-industrial-cybersecurity-friend-foe-or-something-in-between]]></link><guid isPermaLink="false">361fb94f-1958-40ef-bb83-2bcb5168208d</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 14 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/af39b7a5-a093-4be3-b4f9-3af8d92cd73b/Kerry-Tomlinson-Final.mp3" length="73503443" type="audio/mpeg"/><itunes:duration>30:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode></item><item><title>Cybersecurity Challenges and Insights with Industry Analyst Jonathon Gordon</title><itunes:title>Cybersecurity Challenges and Insights with Industry Analyst Jonathon Gordon</itunes:title><description><![CDATA[<p>Jonathon Gordon, Director of Industrial Cybersecurity at TakePoint Research, dives into the intricate world of OT cybersecurity. </p><p>From the disconnect between vendors and asset owners to the complexities of managing diverse remote access technologies, Jonathon shares actionable insights and real-world insights addressing the most pressing cybersecurity challenges in critical infrastructure and manufacturing sectors. </p><p>He discusses the evolving role of automation technology vendors, the growing significance of AI and machine learning, and the pressing need for diversity and knowledge-sharing in the cybersecurity workforce. </p><p>This conversation is a must-listen for anyone navigating the multifaceted world of OT security and seeking practical strategies for cybersecurity resilience.</p><p>Chapters:</p><ul><li>00:00:00 – Why Safety is the Non-Negotiable Priority in OT Cybersecurity</li><li>00:00:42 – Introducing Jonathon Gordon: Insights from an Industry Analyst</li><li>00:01:15 – The Evolution of Industrial Cybersecurity: A Changing Landscape</li><li>00:03:00 – Bridging the Gap: Connecting Vendors and Asset Owners Effectively</li><li>00:07:49 – The Role of Automation Giants: Siemens, Honeywell, and Beyond</li><li>00:13:14 – Remote Access Risks: Addressing One of OT's Greatest Vulnerabilities</li><li>00:15:13 – Regulations and Compliance: Balancing Standards with Real-World Security</li><li>00:18:28 – AI and Innovation: Shaping the Future of OT Cybersecurity</li><li>00:24:42 – Building Resilience Through Diversity and Community Collaboration</li><li>00:28:04 – Final Reflections: Key Takeaways for Long-Term Cybersecurity Success</li></ul><br/><p>Links And Resources:</p><ul><li>Jonathon&nbsp;Gordon&nbsp;on&nbsp;<a href="https://www.linkedin.com/in/jonathongordon/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://takepoint.co/" rel="noopener noreferrer" target="_blank">TakePoint Research&nbsp;</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Jonathon Gordon, Director of Industrial Cybersecurity at TakePoint Research, dives into the intricate world of OT cybersecurity. </p><p>From the disconnect between vendors and asset owners to the complexities of managing diverse remote access technologies, Jonathon shares actionable insights and real-world insights addressing the most pressing cybersecurity challenges in critical infrastructure and manufacturing sectors. </p><p>He discusses the evolving role of automation technology vendors, the growing significance of AI and machine learning, and the pressing need for diversity and knowledge-sharing in the cybersecurity workforce. </p><p>This conversation is a must-listen for anyone navigating the multifaceted world of OT security and seeking practical strategies for cybersecurity resilience.</p><p>Chapters:</p><ul><li>00:00:00 – Why Safety is the Non-Negotiable Priority in OT Cybersecurity</li><li>00:00:42 – Introducing Jonathon Gordon: Insights from an Industry Analyst</li><li>00:01:15 – The Evolution of Industrial Cybersecurity: A Changing Landscape</li><li>00:03:00 – Bridging the Gap: Connecting Vendors and Asset Owners Effectively</li><li>00:07:49 – The Role of Automation Giants: Siemens, Honeywell, and Beyond</li><li>00:13:14 – Remote Access Risks: Addressing One of OT's Greatest Vulnerabilities</li><li>00:15:13 – Regulations and Compliance: Balancing Standards with Real-World Security</li><li>00:18:28 – AI and Innovation: Shaping the Future of OT Cybersecurity</li><li>00:24:42 – Building Resilience Through Diversity and Community Collaboration</li><li>00:28:04 – Final Reflections: Key Takeaways for Long-Term Cybersecurity Success</li></ul><br/><p>Links And Resources:</p><ul><li>Jonathon&nbsp;Gordon&nbsp;on&nbsp;<a href="https://www.linkedin.com/in/jonathongordon/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://takepoint.co/" rel="noopener noreferrer" target="_blank">TakePoint Research&nbsp;</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-challenges-and-insights-with-jonathon-gordon]]></link><guid isPermaLink="false">c1428bb7-7c1a-44b4-ad92-b90437d38e62</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 07 Jan 2025 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/85aa1bac-1430-4004-82ea-9e06fb77244e/ICSI-Jonathon-Gordon-Final.mp3" length="68959181" type="audio/mpeg"/><itunes:duration>28:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>55</itunes:episode><podcast:episode>55</podcast:episode></item><item><title>OT Cybersecurity Insights with Lauren Blocker, Rockwell Automation</title><itunes:title>OT Cybersecurity Insights with Lauren Blocker, Rockwell Automation</itunes:title><description><![CDATA[<p>In this week's episode, Lauren Blocker of Rockwell Automation, shares insights on the evolving landscape of industrial cybersecurity. </p><p>From overcoming the challenges of legacy systems to building standards-based security frameworks, Lauren highlights strategies to elevate cybersecurity in manufacturing and beyond. </p><p>She emphasizes the importance of aligning IT and OT perspectives, addressing obsolescence risks, and fostering proactive approaches to safeguard critical infrastructure. </p><p>Tune in to learn how to bridge the gap between compliance and holistic security while navigating the complexities of the industrial cybersecurity journey.</p><p>Chapters:</p><ul><li>00:00:00 - The Role of Cybersecurity Insurance in Industrial Cybersecurity</li><li>00:00:54 - Introducing Lauren Blocker: Insights from a Leader in OT Security</li><li>00:01:20 - Connecting Industries: Early Career and Digital Transformation Evolution</li><li>00:02:59 - Transitioning to Cybersecurity: Lessons Learned and Industry Shifts</li><li>00:05:48 - Cybersecurity in Industrial Automation: Tackling Legacy Systems and Emerging Risks</li><li>00:08:28 - Overcoming OT Cybersecurity Challenges with Proactive Strategies</li><li>00:12:02 - What It Means to Build Cyber-Ready Machines and Systems</li><li>00:14:27 - Crafting Standards-Based Security Frameworks for Long-Term Success</li><li>00:28:08 - Rockwell Automation’s Approach to Cybersecurity and Industry Leadership</li><li>00:30:07 - Final Insights: Aligning IT and OT for Holistic Security</li></ul><br/><p>Links And Resources:</p><ul><li>Lauren Blocker on <a href="https://www.linkedin.com/in/lauren-blocker-01281a6/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Lauren Blocker of Rockwell Automation, shares insights on the evolving landscape of industrial cybersecurity. </p><p>From overcoming the challenges of legacy systems to building standards-based security frameworks, Lauren highlights strategies to elevate cybersecurity in manufacturing and beyond. </p><p>She emphasizes the importance of aligning IT and OT perspectives, addressing obsolescence risks, and fostering proactive approaches to safeguard critical infrastructure. </p><p>Tune in to learn how to bridge the gap between compliance and holistic security while navigating the complexities of the industrial cybersecurity journey.</p><p>Chapters:</p><ul><li>00:00:00 - The Role of Cybersecurity Insurance in Industrial Cybersecurity</li><li>00:00:54 - Introducing Lauren Blocker: Insights from a Leader in OT Security</li><li>00:01:20 - Connecting Industries: Early Career and Digital Transformation Evolution</li><li>00:02:59 - Transitioning to Cybersecurity: Lessons Learned and Industry Shifts</li><li>00:05:48 - Cybersecurity in Industrial Automation: Tackling Legacy Systems and Emerging Risks</li><li>00:08:28 - Overcoming OT Cybersecurity Challenges with Proactive Strategies</li><li>00:12:02 - What It Means to Build Cyber-Ready Machines and Systems</li><li>00:14:27 - Crafting Standards-Based Security Frameworks for Long-Term Success</li><li>00:28:08 - Rockwell Automation’s Approach to Cybersecurity and Industry Leadership</li><li>00:30:07 - Final Insights: Aligning IT and OT for Holistic Security</li></ul><br/><p>Links And Resources:</p><ul><li>Lauren Blocker on <a href="https://www.linkedin.com/in/lauren-blocker-01281a6/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-lauren-block]]></link><guid isPermaLink="false">60ed3427-f342-4e96-992c-e446fd722e5b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 17 Dec 2024 04:15:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/560f14f4-4e9f-42a0-bace-37d21307c02b/Lauren-Block-Final.mp3" length="78675688" type="audio/mpeg"/><itunes:duration>32:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode></item><item><title>Keys to Bridging the Industrial Cybersecurity IT/OT Gap</title><itunes:title>Keys to Bridging the Industrial Cybersecurity IT/OT Gap</itunes:title><description><![CDATA[<p>In this week's episode, Dino and Craig dive into the persistent disconnect between IT and OT teams and its impact on industrial cybersecurity.</p><p>They explore why IT tools often fall short on the plant floor and provide actionable insights to achieve true IT/OT convergence.</p><p>From addressing the challenges of resource gaps to fostering collaboration between teams, this conversation sheds light on practical strategies to bridge the divide and create a unified approach to industrial cybersecurity on the plant floor and for critical infrastructure.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:49 - Unpacking the Challenges of IT/OT Convergence</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:02:28 - Why IT and OT Teams Often Struggle to Align</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:07:33 - The Role of CIOs and CISOs in Driving Change</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:08:44 - Navigating the Complexities of Diverse Plant Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:10:23 - Partnering with Vendors to Enhance Security Outcomes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:11:16 - Key Questions to Evaluate System Integrators Effectively</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:16:35 - Using Tabletop Exercises to Align IT and OT Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:22:20 - Closing Thoughts: Bridging the Divide for Unified Cybersecurity</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn Group</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Dino and Craig dive into the persistent disconnect between IT and OT teams and its impact on industrial cybersecurity.</p><p>They explore why IT tools often fall short on the plant floor and provide actionable insights to achieve true IT/OT convergence.</p><p>From addressing the challenges of resource gaps to fostering collaboration between teams, this conversation sheds light on practical strategies to bridge the divide and create a unified approach to industrial cybersecurity on the plant floor and for critical infrastructure.</p><p>Chapters:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00:00 - Why Local Collaboration is Critical for Cybersecurity Success</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:07 - Meet Dino and Craig: Experts in IT/OT Integration</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:01:49 - Unpacking the Challenges of IT/OT Convergence</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:02:28 - Why IT and OT Teams Often Struggle to Align</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:04:48 - Building Collaborative Frameworks for Stronger Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:07:33 - The Role of CIOs and CISOs in Driving Change</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:08:44 - Navigating the Complexities of Diverse Plant Environments</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:10:23 - Partnering with Vendors to Enhance Security Outcomes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:11:16 - Key Questions to Evaluate System Integrators Effectively</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:16:35 - Using Tabletop Exercises to Align IT and OT Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:22:20 - Closing Thoughts: Bridging the Divide for Unified Cybersecurity</li></ol><br/><p>Links And Resources:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Industrial Cybersecurity <a href="https://www.linkedin.com/groups/12450584/" rel="noopener noreferrer" target="_blank">LinkedIn Group</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li></ol><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/why-it-tools-fall-short-on-the-plant-floor]]></link><guid isPermaLink="false">e9bf5485-7924-4f1a-a6ea-3a0f9cbb2566</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 10 Dec 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/bae5d47a-21ab-46d8-8e7b-e8a510db51a2/Dino-Craig-Final.mp3" length="58586479" type="audio/mpeg"/><itunes:duration>24:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode></item><item><title>The Future Looks Bright : Building a Career in  OT Cybersecurity</title><itunes:title>The Future Looks Bright : Building a Career in  OT Cybersecurity</itunes:title><description><![CDATA[<p>Explore the fast-evolving field of OT cybersecurity with Emma Duckworth, a professional whose journey from chemical engineering to securing operational technologies highlights the growing need for cross-functional collaboration in industrial environments. </p><p>Emma shares her experiences working on the plant floor, the challenges of uniting IT and OT teams, and the role of emerging technologies like intrusion detection and prevention systems in safeguarding manufacturing processes. </p><p>Gain practical insights into career paths, mentorship, and the critical importance of hands-on learning in this dynamic industry.</p><p>Chapters:</p><ul><li>00:00:00 - A Fresh Look at OT Cybersecurity</li><li>00:01:29 - From Chemical Engineering to Cybersecurity: Emma's Path</li><li>00:02:36 - Thriving in a Rapidly Evolving Industry</li><li>00:04:35 - Tools of the Trade: Technologies Transforming OT Security</li><li>00:05:21 - Bridging the Gap: IT and OT Collaboration Challenges</li><li>00:08:25 - The Cutting Edge: Emerging Trends and Remote Access</li><li>00:10:20 - Building a Cybersecurity Career: Emma’s Advice</li><li>00:15:03 - Looking Ahead: Emma’s Vision for the Future</li><li>00:18:08 - Key Takeaways and Parting Insights</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Explore the fast-evolving field of OT cybersecurity with Emma Duckworth, a professional whose journey from chemical engineering to securing operational technologies highlights the growing need for cross-functional collaboration in industrial environments. </p><p>Emma shares her experiences working on the plant floor, the challenges of uniting IT and OT teams, and the role of emerging technologies like intrusion detection and prevention systems in safeguarding manufacturing processes. </p><p>Gain practical insights into career paths, mentorship, and the critical importance of hands-on learning in this dynamic industry.</p><p>Chapters:</p><ul><li>00:00:00 - A Fresh Look at OT Cybersecurity</li><li>00:01:29 - From Chemical Engineering to Cybersecurity: Emma's Path</li><li>00:02:36 - Thriving in a Rapidly Evolving Industry</li><li>00:04:35 - Tools of the Trade: Technologies Transforming OT Security</li><li>00:05:21 - Bridging the Gap: IT and OT Collaboration Challenges</li><li>00:08:25 - The Cutting Edge: Emerging Trends and Remote Access</li><li>00:10:20 - Building a Cybersecurity Career: Emma’s Advice</li><li>00:15:03 - Looking Ahead: Emma’s Vision for the Future</li><li>00:18:08 - Key Takeaways and Parting Insights</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-emma-duckworth]]></link><guid isPermaLink="false">9abd866d-b875-45ef-bb07-dcfba60efdae</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 19 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/92f5adc5-79d4-4e1c-b3e2-58fc459f8e90/Emma-Duckworth-Final.mp3" length="45318365" type="audio/mpeg"/><itunes:duration>18:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode></item><item><title>Hackers and the Holidays: Strengthening Industrial Cybersecurity</title><itunes:title>Hackers and the Holidays: Strengthening Industrial Cybersecurity</itunes:title><description><![CDATA[<p>As the holidays approach, manufacturing and critical infrastructure organizations face unique cybersecurity challenges due to reduced staffing and associated increased vulnerabilities. </p><p>This episode delves into practical strategies for senior leaders and plant managers to secure their operational technology (OT) environments without disrupting production. </p><p>By adopting continuous monitoring, fostering cross-functional IT-OT collaboration, and engaging OT-specific vendors, organizations can reinforce their cyber resilience. </p><p>Through real-life scenarios, the hosts discuss how proactive planning and structured security practices are vital to maintaining operational continuity and mitigating risks in complex industrial settings.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Cybersecurity Challenges During the Holiday Season</li><li>00:00:52 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/securing-the-factory-floor-a-c-suite-priority" rel="noopener noreferrer" target="_blank">Cybersecurity Missteps Putting the C-Suite at Risk</a></li><li>00:14:06 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/holidays-hackers-keeping-industrial-systems-safe" rel="noopener noreferrer" target="_blank">Holidays &amp; Hackers: Keeping Industrial Control Systems Safe</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>As the holidays approach, manufacturing and critical infrastructure organizations face unique cybersecurity challenges due to reduced staffing and associated increased vulnerabilities. </p><p>This episode delves into practical strategies for senior leaders and plant managers to secure their operational technology (OT) environments without disrupting production. </p><p>By adopting continuous monitoring, fostering cross-functional IT-OT collaboration, and engaging OT-specific vendors, organizations can reinforce their cyber resilience. </p><p>Through real-life scenarios, the hosts discuss how proactive planning and structured security practices are vital to maintaining operational continuity and mitigating risks in complex industrial settings.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Cybersecurity Challenges During the Holiday Season</li><li>00:00:52 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/securing-the-factory-floor-a-c-suite-priority" rel="noopener noreferrer" target="_blank">Cybersecurity Missteps Putting the C-Suite at Risk</a></li><li>00:14:06 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/holidays-hackers-keeping-industrial-systems-safe" rel="noopener noreferrer" target="_blank">Holidays &amp; Hackers: Keeping Industrial Control Systems Safe</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/a]]></link><guid isPermaLink="false">e82883cf-03d5-4243-9f9c-68096f6576c8</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 12 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/396b9b49-c965-40fe-887b-f3759eebda93/ICSI-Ep-51-Highlight-Episode.mp3" length="60006496" type="audio/mpeg"/><itunes:duration>25:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode></item><item><title>The Future Looks Bright : Insights &amp; Advice for Next Gen Cybersecurity Leaders</title><itunes:title>The Future Looks Bright : Insights &amp; Advice for Next Gen Cybersecurity Leaders</itunes:title><description><![CDATA[<p>OT Cybersecurity Engineer, Noah Duckworth, joins Dino Busalachi for this episode. They discuss the challenges and nuances of industrial cybersecurity, as he shares insights from his experience working in the OT (Operational Technology) cybersecurity space. </p><p>Noah talks about the complexities of integrating traditional IT cybersecurity measures within industrial networks, the specific tools and practices used, and the importance of safe, industry-specific approaches to vulnerability management. </p><p>He also provides a perspective on various industrial sectors, such as food and beverage and transportation, and how cybersecurity requirements vary across different verticals and environments. </p><p>This episode offers valuable insights into the evolving field of OT cybersecurity and practical advice for professionals interested in protecting critical infrastructure as well as entering the field of industrial cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Engineering Problem-Solving in Cybersecurity</li><li>00:00:46 - Guest Introduction: Meet OT Cybersecurity Engineer &amp; Expert Noah Duckworth</li><li>00:00:58 - Noah’s Path into OT Cybersecurity and His Industry Experience</li><li>00:02:13 - Key Differences Between OT and IT Cybersecurity</li><li>00:03:01 - Addressing Common OT Cybersecurity Challenges and Tools</li><li>00:06:22 - Navigating Cybersecurity Across Industrial Sectors</li><li>00:08:06 - Insights for New Professionals in Industrial Cybersecurity</li><li>00:10:13 - The Evolving Landscape of OT Cybersecurity</li><li>00:15:22 - Inspiring the Next Generation of Cybersecurity Leaders</li><li>00:16:35 - Closing Thoughts: Practical Advice for Early-Career Professionals</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Noah Duckworth on <a href="https://www.linkedin.com/in/noah-duckworth-907909205/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>OT Cybersecurity Engineer, Noah Duckworth, joins Dino Busalachi for this episode. They discuss the challenges and nuances of industrial cybersecurity, as he shares insights from his experience working in the OT (Operational Technology) cybersecurity space. </p><p>Noah talks about the complexities of integrating traditional IT cybersecurity measures within industrial networks, the specific tools and practices used, and the importance of safe, industry-specific approaches to vulnerability management. </p><p>He also provides a perspective on various industrial sectors, such as food and beverage and transportation, and how cybersecurity requirements vary across different verticals and environments. </p><p>This episode offers valuable insights into the evolving field of OT cybersecurity and practical advice for professionals interested in protecting critical infrastructure as well as entering the field of industrial cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Engineering Problem-Solving in Cybersecurity</li><li>00:00:46 - Guest Introduction: Meet OT Cybersecurity Engineer &amp; Expert Noah Duckworth</li><li>00:00:58 - Noah’s Path into OT Cybersecurity and His Industry Experience</li><li>00:02:13 - Key Differences Between OT and IT Cybersecurity</li><li>00:03:01 - Addressing Common OT Cybersecurity Challenges and Tools</li><li>00:06:22 - Navigating Cybersecurity Across Industrial Sectors</li><li>00:08:06 - Insights for New Professionals in Industrial Cybersecurity</li><li>00:10:13 - The Evolving Landscape of OT Cybersecurity</li><li>00:15:22 - Inspiring the Next Generation of Cybersecurity Leaders</li><li>00:16:35 - Closing Thoughts: Practical Advice for Early-Career Professionals</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Noah Duckworth on <a href="https://www.linkedin.com/in/noah-duckworth-907909205/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/icsi-ep-50]]></link><guid isPermaLink="false">f32fdcdf-c469-4036-a96d-8f299d97d6af</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 05 Nov 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/6255db8d-16c4-4c72-8d35-49ac73bf832c/Noah-Craigworth-Final.mp3" length="42631932" type="audio/mpeg"/><itunes:duration>17:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode></item><item><title>CISA’s Role in Supporting Asset Owners &amp; Government Sectors with Cybersecurity</title><itunes:title>CISA’s Role in Supporting Asset Owners &amp; Government Sectors with Cybersecurity</itunes:title><description><![CDATA[<p>This episode we dive into the critical strategies necessary for securing operational technology (OT) environments, with OT/ICS Strategy Lead at CISA, Danielle Jablanski. </p><p>Danielle explores the evolving role of CISA in assisting asset owners and government sectors, emphasizing the importance of collaboration and understanding in cybersecurity. </p><p>From building resilience against "shiny object syndrome" to prioritizing effective incident response and vendor relationships, this conversation provides valuable insights into crafting an actionable, sustainable OT security strategy. </p><p>Danielle also shares how workforce development is crucial in creating a robust cybersecurity posture and discusses CISA’s approach to integrating AI and machine learning into OT security cautiously and strategically.</p><p>Chapters:</p><ul><li>00:00:00 - Understanding Outsourcing and Effective Incident Management in OT</li><li>00:01:21 - Welcoming Danielle Jablanski from CISA to the Show</li><li>00:01:47 - CISA’s Expanding Role in Supporting Critical Infrastructure Security</li><li>00:03:32 - Key Challenges Facing OT Cybersecurity Today</li><li>00:06:27 - Navigating the Convergence of IT and OT Security</li><li>00:11:36 - CISA’s Approach to Risk Management and Its Global Impact</li><li>00:13:40 - Overview of CISA Services and Regional Cybersecurity Initiatives</li><li>00:16:36 - Enhancing Incident Response Capacity and Cross-Agency Coordination</li><li>00:17:30 - Fusion Centers: Interagency Collaboration for Better Threat Intelligence</li><li>00:18:55 - Guiding Organizations in Reporting and Responding to Incidents</li><li>00:21:03 - Developing Effective Incident Response Playbooks for OT Environments</li><li>00:22:08 - Opportunities and Risks of AI in OT Cybersecurity</li><li>00:24:32 - Emerging Threats: Targeted Attacks on Control Systems</li><li>00:27:00 - Final Thoughts on Workforce Development and Building Cybersecurity Resilience</li></ul><br/><p>Links And Resources:</p><ul><li>Danielle Jablanski on <a href="https://www.linkedin.com/in/daniellejjablanski/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>This episode we dive into the critical strategies necessary for securing operational technology (OT) environments, with OT/ICS Strategy Lead at CISA, Danielle Jablanski. </p><p>Danielle explores the evolving role of CISA in assisting asset owners and government sectors, emphasizing the importance of collaboration and understanding in cybersecurity. </p><p>From building resilience against "shiny object syndrome" to prioritizing effective incident response and vendor relationships, this conversation provides valuable insights into crafting an actionable, sustainable OT security strategy. </p><p>Danielle also shares how workforce development is crucial in creating a robust cybersecurity posture and discusses CISA’s approach to integrating AI and machine learning into OT security cautiously and strategically.</p><p>Chapters:</p><ul><li>00:00:00 - Understanding Outsourcing and Effective Incident Management in OT</li><li>00:01:21 - Welcoming Danielle Jablanski from CISA to the Show</li><li>00:01:47 - CISA’s Expanding Role in Supporting Critical Infrastructure Security</li><li>00:03:32 - Key Challenges Facing OT Cybersecurity Today</li><li>00:06:27 - Navigating the Convergence of IT and OT Security</li><li>00:11:36 - CISA’s Approach to Risk Management and Its Global Impact</li><li>00:13:40 - Overview of CISA Services and Regional Cybersecurity Initiatives</li><li>00:16:36 - Enhancing Incident Response Capacity and Cross-Agency Coordination</li><li>00:17:30 - Fusion Centers: Interagency Collaboration for Better Threat Intelligence</li><li>00:18:55 - Guiding Organizations in Reporting and Responding to Incidents</li><li>00:21:03 - Developing Effective Incident Response Playbooks for OT Environments</li><li>00:22:08 - Opportunities and Risks of AI in OT Cybersecurity</li><li>00:24:32 - Emerging Threats: Targeted Attacks on Control Systems</li><li>00:27:00 - Final Thoughts on Workforce Development and Building Cybersecurity Resilience</li></ul><br/><p>Links And Resources:</p><ul><li>Danielle Jablanski on <a href="https://www.linkedin.com/in/daniellejjablanski/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ai-in-ot-security-separating-the-hype-from-reality-with-danielle-jablanski]]></link><guid isPermaLink="false">2c555257-d6b3-4842-9a46-8c1f87c6221e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 29 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a50ce685-b6a3-47c8-b0c9-86ca8dae49af/Danielle-Jablanski-Final.mp3" length="73784520" type="audio/mpeg"/><itunes:duration>30:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode></item><item><title>AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty</title><itunes:title>AI, Global Trends, and More: A Glimpse into the Future of OT Cybersecurity with Claroty</itunes:title><description><![CDATA[<p>In this week's episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. </p><p>The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. </p><p>Whether you’re dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.</p><p>Chapters:</p><ul><li>00:00:00 - Pandemic's Impact on Critical Infrastructure</li><li>00:01:08 - Introduction to Gary Neelan and Claroty</li><li>00:01:41 - Gary's Role in OT Cybersecurity</li><li>00:02:49 - Evolution of OT Cybersecurity: From Compliance to Strategy</li><li>00:05:23 - IT and OT Convergence: Securing Cyber-Physical Systems</li><li>00:09:46 - Addressing Complex Challenges in OT Cybersecurity</li><li>00:11:56 - OT Cybersecurity Talent Shortage and Managed Services</li><li>00:13:01 - Future of OT Cybersecurity: Adapting to New Threats</li><li>00:14:36 - Modernizing Manufacturing Systems for Enhanced Security</li><li>00:15:52 - Global Cybersecurity Trends in Critical Infrastructure</li><li>00:18:01 - Regional OT Cybersecurity Challenges and Responses</li><li>00:25:01 - The Role of AI in Defending OT Environments</li><li>00:28:19 - Final Thoughts on OT Cybersecurity's Future</li></ul><br/><p>Links And Resources:</p><ul><li>Gary Kneeland on <a href="https://www.linkedin.com/in/gary-kneeland-12b73568/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. </p><p>The conversation touches on how regulatory changes, ransomware threats, and AI advancements are shaping the industry. </p><p>Whether you’re dealing with outdated systems or navigating complex industrial environments, this episode provides practical insights into the challenges and opportunities ahead.</p><p>Chapters:</p><ul><li>00:00:00 - Pandemic's Impact on Critical Infrastructure</li><li>00:01:08 - Introduction to Gary Neelan and Claroty</li><li>00:01:41 - Gary's Role in OT Cybersecurity</li><li>00:02:49 - Evolution of OT Cybersecurity: From Compliance to Strategy</li><li>00:05:23 - IT and OT Convergence: Securing Cyber-Physical Systems</li><li>00:09:46 - Addressing Complex Challenges in OT Cybersecurity</li><li>00:11:56 - OT Cybersecurity Talent Shortage and Managed Services</li><li>00:13:01 - Future of OT Cybersecurity: Adapting to New Threats</li><li>00:14:36 - Modernizing Manufacturing Systems for Enhanced Security</li><li>00:15:52 - Global Cybersecurity Trends in Critical Infrastructure</li><li>00:18:01 - Regional OT Cybersecurity Challenges and Responses</li><li>00:25:01 - The Role of AI in Defending OT Environments</li><li>00:28:19 - Final Thoughts on OT Cybersecurity's Future</li></ul><br/><p>Links And Resources:</p><ul><li>Gary Kneeland on <a href="https://www.linkedin.com/in/gary-kneeland-12b73568/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-gary-kneeland]]></link><guid isPermaLink="false">d67bf43d-dbcd-4911-82ea-523245155d07</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 22 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dcd0892e-a892-4d29-a3ba-1deadd512471/ICSI-Ep-48-Gary-Kneeland.mp3" length="70686398" type="audio/mpeg"/><itunes:duration>29:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode></item><item><title>Women in STEM: Bridging the Talent Gap in Industrial Cybersecurity</title><itunes:title>Women in STEM: Bridging the Talent Gap in Industrial Cybersecurity</itunes:title><description><![CDATA[<p>Craig sits down with Jessica Cook, a computer science engineering senior at Mississippi State University, to explore her journey into industrial cybersecurity. </p><p>From discovering her passion for tech in high school to gaining hands-on experience in OT cybersecurity, Jessica discusses how internships and real-world exposure have shaped her understanding of the industry. </p><p>She talks about the exciting evolution of industrial careers, highlighting how traditional manufacturing roles are becoming more technical and data-driven. </p><p>Jessica shares valuable advice on building relationships, leveraging networking opportunities, and overcoming the challenges of being a woman in a traditionally male-dominated field. </p><p>As she prepares to graduate, she reflects on her career path and the opportunities ahead in cybersecurity and OT.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction and Jessica’s Background in Cybersecurity</li><li>00:01:19 - Discovering a Passion for Tech and Breaking Into STEM</li><li>00:03:11 - Industrial Cybersecurity: Navigating a Changing Landscape</li><li>00:05:29 - Mississippi State’s Cybersecurity Program and Its Growth</li><li>00:06:58 - Real-World Experience: Internships and Co-Ops in OT Cybersecurity</li><li>00:10:06 - Key Courses and Mentors Shaping a Cybersecurity Career</li><li>00:14:30 - Leadership, Networking, and Extracurriculars in Engineering</li><li>00:19:06 - Practical Advice for Students and Early-Career Professionals</li><li>00:21:15 - Looking Ahead: Graduation and Career Prospects in OT Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig sits down with Jessica Cook, a computer science engineering senior at Mississippi State University, to explore her journey into industrial cybersecurity. </p><p>From discovering her passion for tech in high school to gaining hands-on experience in OT cybersecurity, Jessica discusses how internships and real-world exposure have shaped her understanding of the industry. </p><p>She talks about the exciting evolution of industrial careers, highlighting how traditional manufacturing roles are becoming more technical and data-driven. </p><p>Jessica shares valuable advice on building relationships, leveraging networking opportunities, and overcoming the challenges of being a woman in a traditionally male-dominated field. </p><p>As she prepares to graduate, she reflects on her career path and the opportunities ahead in cybersecurity and OT.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction and Jessica’s Background in Cybersecurity</li><li>00:01:19 - Discovering a Passion for Tech and Breaking Into STEM</li><li>00:03:11 - Industrial Cybersecurity: Navigating a Changing Landscape</li><li>00:05:29 - Mississippi State’s Cybersecurity Program and Its Growth</li><li>00:06:58 - Real-World Experience: Internships and Co-Ops in OT Cybersecurity</li><li>00:10:06 - Key Courses and Mentors Shaping a Cybersecurity Career</li><li>00:14:30 - Leadership, Networking, and Extracurriculars in Engineering</li><li>00:19:06 - Practical Advice for Students and Early-Career Professionals</li><li>00:21:15 - Looking Ahead: Graduation and Career Prospects in OT Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-jessica-cook]]></link><guid isPermaLink="false">b7a2f517-b8d0-4d73-a136-a45886b93fbf</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 15 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/41f99d27-7d54-4df7-860b-34d587510d64/Craig-and-Jessica-Final.mp3" length="53486332" type="audio/mpeg"/><itunes:duration>22:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode></item><item><title>How CISOs Are Bridging the Gap between OT and IT Cybersecurity</title><itunes:title>How CISOs Are Bridging the Gap between OT and IT Cybersecurity</itunes:title><description><![CDATA[<p>In this rewind episode, we explore the critical role CISOs play in bridging the gap between operational technology (OT) and enterprise cybersecurity. </p><p>With manufacturing and critical infrastructure facing increasing cyber threats, CISOs must navigate both the boardroom and the plant floor to secure complex environments without disrupting production. </p><p>This discussion focuses on the importance of risk assessment, real-time monitoring, and the adoption of specialized cybersecurity tools. </p><p>The episode highlights the need for cross-functional collaboration, leveraging external expertise, and shifting toward proactive, secure-by-design approaches. </p><p>It also addresses the vulnerabilities in supply chains, the limitations of relying on cybersecurity insurance, and the necessity of actionable, strategic measures to protect industrial environments.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: How CISOs Are Redefining Industrial Cybersecurity from the Ground Up</li><li>00:00:54 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/securing-the-factory-floor-a-c-suite-priority" rel="noopener noreferrer" target="_blank"> Cybersecurity Missteps Putting the C-Suite at Risk</a></li><li>00:12:31 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/ciso-resignations-is-the-industrial-sector-prepared-for-the-fallout" rel="noopener noreferrer" target="_blank">CISO Resignations: Is the Industrial Sector Prepared for the Fallout?</a></li><li>00:23:43 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/securing-critical-assets-what-every-ciso-should-know" rel="noopener noreferrer" target="_blank">Securing Critical Assets: What Every CISO Should Know</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this rewind episode, we explore the critical role CISOs play in bridging the gap between operational technology (OT) and enterprise cybersecurity. </p><p>With manufacturing and critical infrastructure facing increasing cyber threats, CISOs must navigate both the boardroom and the plant floor to secure complex environments without disrupting production. </p><p>This discussion focuses on the importance of risk assessment, real-time monitoring, and the adoption of specialized cybersecurity tools. </p><p>The episode highlights the need for cross-functional collaboration, leveraging external expertise, and shifting toward proactive, secure-by-design approaches. </p><p>It also addresses the vulnerabilities in supply chains, the limitations of relying on cybersecurity insurance, and the necessity of actionable, strategic measures to protect industrial environments.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: How CISOs Are Redefining Industrial Cybersecurity from the Ground Up</li><li>00:00:54 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/securing-the-factory-floor-a-c-suite-priority" rel="noopener noreferrer" target="_blank"> Cybersecurity Missteps Putting the C-Suite at Risk</a></li><li>00:12:31 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/ciso-resignations-is-the-industrial-sector-prepared-for-the-fallout" rel="noopener noreferrer" target="_blank">CISO Resignations: Is the Industrial Sector Prepared for the Fallout?</a></li><li>00:23:43 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/securing-critical-assets-what-every-ciso-should-know" rel="noopener noreferrer" target="_blank">Securing Critical Assets: What Every CISO Should Know</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ep-46]]></link><guid isPermaLink="false">f0b68066-b71c-495f-8a12-42aff7cba938</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 08 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ca5badf-72e0-4836-99ce-bfc956987f7a/Ep-46-Rewind-Final.mp3" length="84548014" type="audio/mpeg"/><itunes:duration>35:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode></item><item><title>OT Cybersecurity Lessons from the Trenches Revisited</title><itunes:title>OT Cybersecurity Lessons from the Trenches Revisited</itunes:title><description><![CDATA[<p>In this reflective episode, we revisit the real-world challenges of securing industrial environments, where the intersection of IT and OT often creates unforeseen cybersecurity vulnerabilities. </p><p>From mismanaged remote access to the critical need for continuous asset monitoring, our experts dive deep into the lessons learned from boots on the ground work in the field.</p><p>They share insights on managing OT cybersecurity risks while maintaining production uptime and operational integrity. </p><p>This episode provides invaluable takeaways for those navigating the complexities of protecting industrial networks, offering practical solutions for balancing security with operational demands.</p><p>Chapters:</p><ul><li>00:00:00 - A rewind to the biggest OT cybersecurity lessons and surprising moments!</li><li>00:01:05 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/unplugging-the-myths-of-machinery-shutdown-and-cybersecurity/" rel="noopener noreferrer" target="_blank">Missteps and Common Blunders with Manufacturing, ICS and Cybersecurity</a></li><li>00:10:26 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-lessons-from-the-field/" rel="noopener noreferrer" target="_blank">Industrial Cybersecurity Lessons From the Field</a></li><li>00:20:19 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/the-state-of-ot-cybersecurity-from-the-field/" rel="noopener noreferrer" target="_blank">The State of OT Cybersecurity From the Field</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this reflective episode, we revisit the real-world challenges of securing industrial environments, where the intersection of IT and OT often creates unforeseen cybersecurity vulnerabilities. </p><p>From mismanaged remote access to the critical need for continuous asset monitoring, our experts dive deep into the lessons learned from boots on the ground work in the field.</p><p>They share insights on managing OT cybersecurity risks while maintaining production uptime and operational integrity. </p><p>This episode provides invaluable takeaways for those navigating the complexities of protecting industrial networks, offering practical solutions for balancing security with operational demands.</p><p>Chapters:</p><ul><li>00:00:00 - A rewind to the biggest OT cybersecurity lessons and surprising moments!</li><li>00:01:05 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/unplugging-the-myths-of-machinery-shutdown-and-cybersecurity/" rel="noopener noreferrer" target="_blank">Missteps and Common Blunders with Manufacturing, ICS and Cybersecurity</a></li><li>00:10:26 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-lessons-from-the-field/" rel="noopener noreferrer" target="_blank">Industrial Cybersecurity Lessons From the Field</a></li><li>00:20:19 - <a href="https://industrial-cybersecurity-insider.captivate.fm/episode/the-state-of-ot-cybersecurity-from-the-field/" rel="noopener noreferrer" target="_blank">The State of OT Cybersecurity From the Field</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/rewind-episode]]></link><guid isPermaLink="false">3ad05e5b-e66c-490c-813a-1cbcd20c27a0</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 01 Oct 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/4b7de865-cd9a-459d-bc44-cd279702beca/ICSI-Ep-44-Highlight-Episode.mp3" length="76416618" type="audio/mpeg"/><itunes:duration>31:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode></item><item><title>Securing Critical Assets: What Every CISO Should Know</title><itunes:title>Securing Critical Assets: What Every CISO Should Know</itunes:title><description><![CDATA[<p>In this episode, Craig and Dino explore the evolving responsibilities of the CISO in managing cybersecurity within operational technology (OT) environments. </p><p>They address the persistent disconnect between IT and OT teams and the unique challenges CISOs face in bridging this gap. </p><p>With a focus on collaboration, they discuss the critical role of external partnerships and the importance of understanding the industrial landscape to implement effective security measures. </p><p>The conversation highlights how CISOs can balance rigorous cybersecurity protocols with operational demands, ensuring both safety and continuous uptime in complex industrial systems.</p><p>Chapters:</p><ul><li><strong>00:00:00 - Prioritizing Safety and Minimizing Downtime</strong></li><li><strong>00:00:48 - The Evolving Role of CISOs in Operational Technology (OT)</strong></li><li><strong>00:02:11 - Overcoming IT and OT Collaboration Challenges</strong></li><li><strong>00:03:09 - The Persistent Disconnect Between IT and OT</strong></li><li><strong>00:04:06 - CISOs' Responsibility for OT Security</strong></li><li><strong>00:05:08 - Balancing Security and Operational Uptime</strong></li><li><strong>00:06:57 - The Role of External Resources in Cybersecurity</strong></li><li><strong>00:11:38 - Limited CISO Interaction with the Board</strong></li><li><strong>00:20:38 - The Realities of Relying on Cybersecurity Insurance</strong></li><li><strong>00:24:18 - Conclusion: Moving Forward with IT-OT Collaboration</strong></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Craig and Dino explore the evolving responsibilities of the CISO in managing cybersecurity within operational technology (OT) environments. </p><p>They address the persistent disconnect between IT and OT teams and the unique challenges CISOs face in bridging this gap. </p><p>With a focus on collaboration, they discuss the critical role of external partnerships and the importance of understanding the industrial landscape to implement effective security measures. </p><p>The conversation highlights how CISOs can balance rigorous cybersecurity protocols with operational demands, ensuring both safety and continuous uptime in complex industrial systems.</p><p>Chapters:</p><ul><li><strong>00:00:00 - Prioritizing Safety and Minimizing Downtime</strong></li><li><strong>00:00:48 - The Evolving Role of CISOs in Operational Technology (OT)</strong></li><li><strong>00:02:11 - Overcoming IT and OT Collaboration Challenges</strong></li><li><strong>00:03:09 - The Persistent Disconnect Between IT and OT</strong></li><li><strong>00:04:06 - CISOs' Responsibility for OT Security</strong></li><li><strong>00:05:08 - Balancing Security and Operational Uptime</strong></li><li><strong>00:06:57 - The Role of External Resources in Cybersecurity</strong></li><li><strong>00:11:38 - Limited CISO Interaction with the Board</strong></li><li><strong>00:20:38 - The Realities of Relying on Cybersecurity Insurance</strong></li><li><strong>00:24:18 - Conclusion: Moving Forward with IT-OT Collaboration</strong></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, and <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/securing-critical-assets-what-every-ciso-should-know]]></link><guid isPermaLink="false">388802af-9d6a-4f21-bb93-9c8c0ecb557e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 24 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9ca1fed5-3dc5-40b7-af05-6a605ce0b8b7/ICSI-Ep-44-Dino-and-Craig-FInal.mp3" length="67092994" type="audio/mpeg"/><itunes:duration>27:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode></item><item><title>Zero Day to Virtual Patching: Cybersecurity Solutions A-Z with TXOne Networks Revisited</title><itunes:title>Zero Day to Virtual Patching: Cybersecurity Solutions A-Z with TXOne Networks Revisited</itunes:title><description><![CDATA[<p>We revisit key insights from past conversations with Dave Purdy and Debbie Lay of TXOne Networks, who shared their expertise on the critical cybersecurity challenges facing industrial environments. </p><p>The episode delves into innovative solutions such as virtual patching and deep packet inspection, which are vital for securing legacy systems without causing operational disruption. </p><p>With a focus on mitigating zero-day vulnerabilities and ransomware threats, the discussions also emphasize the importance of bridging the IT/OT divide to create cohesive, secure environments. </p><p>This episode provides actionable strategies for professionals responsible for managing the cybersecurity of critical infrastructure in sectors like energy, manufacturing, and utilities.</p><p>Chapters</p><ul><li>00:00:00 – Introduction to Key Cybersecurity Challenges in Industrial Environments</li><li>00:01:19 – Why Visibility is Critical for Securing Industrial Operations</li><li>00:01:36 – TXOne Networks' Native Protocols and the Power of Deep Packet Inspection</li><li>00:02:53 – Addressing Zero-Day Vulnerabilities through the Zero Day Initiative</li><li>00:04:26 – Personal Insights and Fun Facts from Industry Experts</li><li>00:05:23 – Overcoming Barriers to Industrial Cybersecurity Adoption</li><li>00:06:35 – IT-OT Collaboration: A Must for Comprehensive Cybersecurity</li><li>00:09:22 – Global Cybersecurity Trends and Adoption in Industrial Sectors</li><li>00:10:54 – Virtual Patching: A Game-Changer for Securing OT Systems</li><li>00:13:50 – Navigating IT-OT Convergence for Improved Security Outcomes</li><li>00:19:30 – TXOne's Innovative Security Solutions for Industrial Environments</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://open.spotify.com/episode/5GlJLaGXwjhfCUEapw1fWw?si=TtUDOIT6Tiy_m_wYPnkiIw" rel="noopener noreferrer" target="_blank">Crowdstrike, Virtual Patching, and Industrial OT Environments with Debbie Lay</a></li><li><a href="https://open.spotify.com/episode/6CDSiXLb5zJMqPLQpNbjF9?si=GnM5JOL9SHGOgJ_ZpsCigw" rel="noopener noreferrer" target="_blank">Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://www.youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>We revisit key insights from past conversations with Dave Purdy and Debbie Lay of TXOne Networks, who shared their expertise on the critical cybersecurity challenges facing industrial environments. </p><p>The episode delves into innovative solutions such as virtual patching and deep packet inspection, which are vital for securing legacy systems without causing operational disruption. </p><p>With a focus on mitigating zero-day vulnerabilities and ransomware threats, the discussions also emphasize the importance of bridging the IT/OT divide to create cohesive, secure environments. </p><p>This episode provides actionable strategies for professionals responsible for managing the cybersecurity of critical infrastructure in sectors like energy, manufacturing, and utilities.</p><p>Chapters</p><ul><li>00:00:00 – Introduction to Key Cybersecurity Challenges in Industrial Environments</li><li>00:01:19 – Why Visibility is Critical for Securing Industrial Operations</li><li>00:01:36 – TXOne Networks' Native Protocols and the Power of Deep Packet Inspection</li><li>00:02:53 – Addressing Zero-Day Vulnerabilities through the Zero Day Initiative</li><li>00:04:26 – Personal Insights and Fun Facts from Industry Experts</li><li>00:05:23 – Overcoming Barriers to Industrial Cybersecurity Adoption</li><li>00:06:35 – IT-OT Collaboration: A Must for Comprehensive Cybersecurity</li><li>00:09:22 – Global Cybersecurity Trends and Adoption in Industrial Sectors</li><li>00:10:54 – Virtual Patching: A Game-Changer for Securing OT Systems</li><li>00:13:50 – Navigating IT-OT Convergence for Improved Security Outcomes</li><li>00:19:30 – TXOne's Innovative Security Solutions for Industrial Environments</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://open.spotify.com/episode/5GlJLaGXwjhfCUEapw1fWw?si=TtUDOIT6Tiy_m_wYPnkiIw" rel="noopener noreferrer" target="_blank">Crowdstrike, Virtual Patching, and Industrial OT Environments with Debbie Lay</a></li><li><a href="https://open.spotify.com/episode/6CDSiXLb5zJMqPLQpNbjF9?si=GnM5JOL9SHGOgJ_ZpsCigw" rel="noopener noreferrer" target="_blank">Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://www.youtube.com/playlist?list=PLM8YEFHL1WXcg3K83xBVzBnV7G4dkS0DR" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/highlight-episode]]></link><guid isPermaLink="false">9f7939c1-79b7-4148-8ecd-0a8739be4c57</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 17 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f6f66fa2-364c-4bd1-aded-d521980c3aaa/ICSI-Ep-43-TXOne-Look-Back-Final.mp3" length="52337990" type="audio/mpeg"/><itunes:duration>21:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode></item><item><title>Proactive vs. Reactive Cybersecurity: A Strategic Communications Perspective</title><itunes:title>Proactive vs. Reactive Cybersecurity: A Strategic Communications Perspective</itunes:title><description><![CDATA[<p>In this week's episode, Craig Duckworth and LuRae Lumpkin dive into the critical need for translating high-level cybersecurity solutions and priorities into clear, succinct communication across the industrial cybersecurity industry. </p><p>They focus on bridging the communication gap between IT and OT teams, discussing how a unified approach from both leadership and operations can strengthen security efforts. </p><p>The episode highlights evolving strategies for addressing breaches, improving risk management, and safeguarding critical infrastructure. </p><p>Key takeaways include the importance of tailoring cybersecurity communication to different audiences, implementing proactive measures, and fostering a consistent, organization-wide message that integrates cybersecurity into the core culture regardless of the organization.</p><p>Chapters:</p><ul><li>00:00:00 - Setting the Stage: Why Cybersecurity Communication Matters</li><li>00:00:54 - LuRae Lumpkin's Proven Expertise in Industrial Cybersecurity</li><li>00:01:34 - How Cybersecurity Messaging Has Evolved Across IT and OT</li><li>00:04:49 - Lessons from Major Cyber Breaches: What You Need to Know</li><li>00:06:47 - Why Being Proactive is Crucial in Cybersecurity Communication</li><li>00:08:41 - Building a Cybersecurity-Driven Culture from the Top Down</li><li>00:10:44 - Simplifying Complex Cybersecurity Issues for Maximum Impact</li><li>00:12:30 - Making Cybersecurity a Company-Wide Priority</li><li>00:14:15 - Bridging the Communication Gap Between IT and OT</li><li>00:16:00 - Creating a Unified Language Across Teams</li><li>00:18:45 - The Role of External Vendors in Cybersecurity Communication</li><li>00:20:27 - Practical Advice to Strengthen Your Organization's Cybersecurity</li><li>00:24:39 - Final Insights on Fostering a Cyber-Aware Organization</li></ul><br/><p>Links And Resources:</p><ul><li>LuRae Lumpkin on <a href="https://www.linkedin.com/in/luraelumpkin/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Craig Duckworth and LuRae Lumpkin dive into the critical need for translating high-level cybersecurity solutions and priorities into clear, succinct communication across the industrial cybersecurity industry. </p><p>They focus on bridging the communication gap between IT and OT teams, discussing how a unified approach from both leadership and operations can strengthen security efforts. </p><p>The episode highlights evolving strategies for addressing breaches, improving risk management, and safeguarding critical infrastructure. </p><p>Key takeaways include the importance of tailoring cybersecurity communication to different audiences, implementing proactive measures, and fostering a consistent, organization-wide message that integrates cybersecurity into the core culture regardless of the organization.</p><p>Chapters:</p><ul><li>00:00:00 - Setting the Stage: Why Cybersecurity Communication Matters</li><li>00:00:54 - LuRae Lumpkin's Proven Expertise in Industrial Cybersecurity</li><li>00:01:34 - How Cybersecurity Messaging Has Evolved Across IT and OT</li><li>00:04:49 - Lessons from Major Cyber Breaches: What You Need to Know</li><li>00:06:47 - Why Being Proactive is Crucial in Cybersecurity Communication</li><li>00:08:41 - Building a Cybersecurity-Driven Culture from the Top Down</li><li>00:10:44 - Simplifying Complex Cybersecurity Issues for Maximum Impact</li><li>00:12:30 - Making Cybersecurity a Company-Wide Priority</li><li>00:14:15 - Bridging the Communication Gap Between IT and OT</li><li>00:16:00 - Creating a Unified Language Across Teams</li><li>00:18:45 - The Role of External Vendors in Cybersecurity Communication</li><li>00:20:27 - Practical Advice to Strengthen Your Organization's Cybersecurity</li><li>00:24:39 - Final Insights on Fostering a Cyber-Aware Organization</li></ul><br/><p>Links And Resources:</p><ul><li>LuRae Lumpkin on <a href="https://www.linkedin.com/in/luraelumpkin/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/proactive-vs-reactive-cybersecurity-a-communication-perspective]]></link><guid isPermaLink="false">01d89947-c9ac-44e5-9737-95f5d30c1a7b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 10 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/770d84fe-be7d-4cdf-aa0a-17cb87063913/ICSI-Ep-42-LuRae-Final.mp3" length="61388896" type="audio/mpeg"/><itunes:duration>25:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode></item><item><title>From Legacy Systems to Ransomware: The Evolution of OT Cybersecurity</title><itunes:title>From Legacy Systems to Ransomware: The Evolution of OT Cybersecurity</itunes:title><description><![CDATA[<p>In <a href="https://player.captivate.fm/episode/0b91d072-d406-43f6-8c69-91f7e15bdca7/" rel="noopener noreferrer" target="_blank">this episode</a>, <a href="https://www.linkedin.com/in/craigaduckworth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAWDtWgBfTwMHKBYPPoK7CQfoCNLFzF2FZQ" rel="noopener noreferrer" target="_blank">Craig Duckworth</a> is joined by <a href="https://www.linkedin.com/article/edit/7236769475746750465/?author=urn%3Ali%3Acompany%3A34689460#" rel="noopener noreferrer" target="_blank">Roger Hill</a>, founder of <a href="https://www.linkedin.com/article/edit/7236769475746750465/?author=urn%3Ali%3Acompany%3A34689460#" rel="noopener noreferrer" target="_blank">Hillstrong Group Security</a>.</p><p>Roger is a seasoned 30-year industry veteran in the field of industrial automation and cybersecurity. He joins Craig to discuss the critical challenges and emerging trends in industrial cybersecurity.</p><p>From the evolution of security practices in industrial environments to the complexities of integrating modern solutions with legacy systems, Roger offers invaluable insights. </p><p>He delves into the importance of breaking down silos between IT and OT teams, the rise of ransomware as a major threat, and the need for collaborative approaches to secure critical infrastructure. </p><p>Whether you're grappling with aging systems or looking to future-proof your OT security, this conversation is packed with practical advice and forward-thinking strategies.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to OT Cybersecurity</li><li>00:00:46 - Meet Roger Hill: A Veteran in Industrial Automation and Cybersecurity</li><li>00:00:57 - How OT Security Has Evolved Over 30 Years</li><li>00:01:52 - The Impact of Stuxnet: A Turning Point in OT Cybersecurity</li><li>00:03:41 - Navigating Emerging Technologies and the Rising Ransomware Threat</li><li>00:05:32 - Overcoming Challenges in Adopting New Technologies</li><li>00:07:13 - Why Context and Visibility Are Key to Effective OT Security</li><li>00:09:10 - Budgeting and Governance: The Backbone of OT Security</li><li>00:11:13 - Breaking Down Silos: The Critical Role of IT and OT Collaboration</li><li>00:13:00 - Challenges in Global OT Security: Governance and Compliance</li><li>00:14:50 - The Aging Workforce Problem: Building and Retaining Talent</li><li>00:17:00 - Importance of Cross-Functional Teams in OT Security</li><li>00:23:24 - What’s Next? The Future of OT Cybersecurity</li><li>00:28:29 - Final Thoughts: Practical Advice and Forward-Looking Strategies</li></ul><br/><p>Links And Resources:</p><ul><li>Roger Hill on <a href="https://www.linkedin.com/in/rogerlhill" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In <a href="https://player.captivate.fm/episode/0b91d072-d406-43f6-8c69-91f7e15bdca7/" rel="noopener noreferrer" target="_blank">this episode</a>, <a href="https://www.linkedin.com/in/craigaduckworth?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAWDtWgBfTwMHKBYPPoK7CQfoCNLFzF2FZQ" rel="noopener noreferrer" target="_blank">Craig Duckworth</a> is joined by <a href="https://www.linkedin.com/article/edit/7236769475746750465/?author=urn%3Ali%3Acompany%3A34689460#" rel="noopener noreferrer" target="_blank">Roger Hill</a>, founder of <a href="https://www.linkedin.com/article/edit/7236769475746750465/?author=urn%3Ali%3Acompany%3A34689460#" rel="noopener noreferrer" target="_blank">Hillstrong Group Security</a>.</p><p>Roger is a seasoned 30-year industry veteran in the field of industrial automation and cybersecurity. He joins Craig to discuss the critical challenges and emerging trends in industrial cybersecurity.</p><p>From the evolution of security practices in industrial environments to the complexities of integrating modern solutions with legacy systems, Roger offers invaluable insights. </p><p>He delves into the importance of breaking down silos between IT and OT teams, the rise of ransomware as a major threat, and the need for collaborative approaches to secure critical infrastructure. </p><p>Whether you're grappling with aging systems or looking to future-proof your OT security, this conversation is packed with practical advice and forward-thinking strategies.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to OT Cybersecurity</li><li>00:00:46 - Meet Roger Hill: A Veteran in Industrial Automation and Cybersecurity</li><li>00:00:57 - How OT Security Has Evolved Over 30 Years</li><li>00:01:52 - The Impact of Stuxnet: A Turning Point in OT Cybersecurity</li><li>00:03:41 - Navigating Emerging Technologies and the Rising Ransomware Threat</li><li>00:05:32 - Overcoming Challenges in Adopting New Technologies</li><li>00:07:13 - Why Context and Visibility Are Key to Effective OT Security</li><li>00:09:10 - Budgeting and Governance: The Backbone of OT Security</li><li>00:11:13 - Breaking Down Silos: The Critical Role of IT and OT Collaboration</li><li>00:13:00 - Challenges in Global OT Security: Governance and Compliance</li><li>00:14:50 - The Aging Workforce Problem: Building and Retaining Talent</li><li>00:17:00 - Importance of Cross-Functional Teams in OT Security</li><li>00:23:24 - What’s Next? The Future of OT Cybersecurity</li><li>00:28:29 - Final Thoughts: Practical Advice and Forward-Looking Strategies</li></ul><br/><p>Links And Resources:</p><ul><li>Roger Hill on <a href="https://www.linkedin.com/in/rogerlhill" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-roger-hill]]></link><guid isPermaLink="false">0b91d072-d406-43f6-8c69-91f7e15bdca7</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 03 Sep 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dfa57995-8ecf-46c8-8830-5919591a3281/Ep-41-Roger-Hill-Final.mp3" length="78106218" type="audio/mpeg"/><itunes:duration>32:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode></item><item><title>How CISA Supports Cybersecurity from Critical Infrastructure to Elections</title><itunes:title>How CISA Supports Cybersecurity from Critical Infrastructure to Elections</itunes:title><description><![CDATA[<p>Chris Cockburn, Cybersecurity Advisor at CISA, shares his insights on how CISA supports industrial cybersecurity from critical infrastructure to elections. </p><p>We explore the impact of state-sponsored cyber threats, the importance of securing emerging technologies like AI through the "Secure by Design" initiative, and the role of government-private sector partnerships in building a resilient cybersecurity posture. </p><p>He shares the free resources available to support industrial cybersecurity including Fusion Centers.&nbsp;Whether it's defending against sophisticated cyber attacks or ensuring the integrity of our election systems, this episode provides essential guidance for securing the future of critical infrastructure.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to AI security concerns in critical infrastructure</li><li>00:00:59 - Meet Chris Cockburn, cybersecurity expert from CISA</li><li>00:01:10 - Chris Cockburn’s journey from DoD to CISA</li><li>00:02:21 - Overview of global industrial cybersecurity challenges</li><li>00:03:35 - How CISA collaborates to strengthen cybersecurity</li><li>00:04:52 - Regional cybersecurity support for critical sectors</li><li>00:05:49 - Tackling resource challenges in cybersecurity</li><li>00:08:03 - Continuous efforts to secure election systems</li><li>00:09:26 - Navigating the complexities of IT/OT convergence</li><li>00:12:36 - Making the most of cybersecurity insurance</li><li>00:15:08 - Ensuring AI is secure by design</li><li>00:19:06 - CISA’s partnership with Idaho National Lab for cybersecurity training</li><li>00:20:48 - Key strategies for building cyber resilience</li><li>00:22:09 - Fusion Centers: Enhancing collaboration in cybersecurity</li><li>00:23:53 - Final thoughts on the future of cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Chris Cockburn on <a href="https://www.linkedin.com/in/christopher-cockburn-63538154/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">CISA Cybersecurity </a><a href="https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools" rel="noopener noreferrer" target="_blank">Resources and Tools</a> </li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Chris Cockburn, Cybersecurity Advisor at CISA, shares his insights on how CISA supports industrial cybersecurity from critical infrastructure to elections. </p><p>We explore the impact of state-sponsored cyber threats, the importance of securing emerging technologies like AI through the "Secure by Design" initiative, and the role of government-private sector partnerships in building a resilient cybersecurity posture. </p><p>He shares the free resources available to support industrial cybersecurity including Fusion Centers.&nbsp;Whether it's defending against sophisticated cyber attacks or ensuring the integrity of our election systems, this episode provides essential guidance for securing the future of critical infrastructure.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to AI security concerns in critical infrastructure</li><li>00:00:59 - Meet Chris Cockburn, cybersecurity expert from CISA</li><li>00:01:10 - Chris Cockburn’s journey from DoD to CISA</li><li>00:02:21 - Overview of global industrial cybersecurity challenges</li><li>00:03:35 - How CISA collaborates to strengthen cybersecurity</li><li>00:04:52 - Regional cybersecurity support for critical sectors</li><li>00:05:49 - Tackling resource challenges in cybersecurity</li><li>00:08:03 - Continuous efforts to secure election systems</li><li>00:09:26 - Navigating the complexities of IT/OT convergence</li><li>00:12:36 - Making the most of cybersecurity insurance</li><li>00:15:08 - Ensuring AI is secure by design</li><li>00:19:06 - CISA’s partnership with Idaho National Lab for cybersecurity training</li><li>00:20:48 - Key strategies for building cyber resilience</li><li>00:22:09 - Fusion Centers: Enhancing collaboration in cybersecurity</li><li>00:23:53 - Final thoughts on the future of cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Chris Cockburn on <a href="https://www.linkedin.com/in/christopher-cockburn-63538154/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">CISA Cybersecurity </a><a href="https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools" rel="noopener noreferrer" target="_blank">Resources and Tools</a> </li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-chris-cockburn]]></link><guid isPermaLink="false">955a060b-f416-4ae2-ad80-d735bc8461c2</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 27 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e5797efc-9366-490d-92f1-69b68b4c1e41/Ep-40-Final.mp3" length="59189385" type="audio/mpeg"/><itunes:duration>24:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode></item><item><title>Vendor and Version Lock Threats to Industrial Cybersecurity</title><itunes:title>Vendor and Version Lock Threats to Industrial Cybersecurity</itunes:title><description><![CDATA[<p>In this episode, Dino and Craig dive into the complexities of cybersecurity in the operational technology (OT) space, focusing on the challenges posed by vendor lock, version lock, and outdated systems.&nbsp;</p><p>They explore the disconnect between IT and OT teams, emphasizing the need for collaboration to secure industrial environments effectively.&nbsp;</p><p>The discussion highlights practical strategies like virtual patching and microsegmentation to mitigate risks, stressing the importance of working with the right partners to protect legacy systems while maintaining production efficiency.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Equipment Life Cycle</li><li>00:00:56 - Key Challenges in Operational Technology (OT)</li><li>00:01:24 - The OEM Blockade: A Barrier to Progress</li><li>00:02:09 - Unpatched Vulnerabilities in Newly Installed Equipment</li><li>00:04:22 - Bridging the Gap: IT and OT Collaboration Issues</li><li>00:05:40 - Practical Solutions: Compensating Controls</li><li>00:06:48 - The Realities of IT and OT Convergence</li><li>00:09:00 - Shared Infrastructure Risks</li><li>00:12:00 - The Gap in Due Diligence on the Plant Floor</li><li>00:14:00 - The Need for Better OT Cybersecurity Practices</li><li>00:16:00 - Finger-Pointing in OT Environments</li><li>00:19:21 - Why Process Integrity Matters in OT</li><li>00:24:02 - Final Thoughts: Moving Forward in OT Security</li></ul><br/><p>Links And Resources:</p><ul><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino and Craig dive into the complexities of cybersecurity in the operational technology (OT) space, focusing on the challenges posed by vendor lock, version lock, and outdated systems.&nbsp;</p><p>They explore the disconnect between IT and OT teams, emphasizing the need for collaboration to secure industrial environments effectively.&nbsp;</p><p>The discussion highlights practical strategies like virtual patching and microsegmentation to mitigate risks, stressing the importance of working with the right partners to protect legacy systems while maintaining production efficiency.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Equipment Life Cycle</li><li>00:00:56 - Key Challenges in Operational Technology (OT)</li><li>00:01:24 - The OEM Blockade: A Barrier to Progress</li><li>00:02:09 - Unpatched Vulnerabilities in Newly Installed Equipment</li><li>00:04:22 - Bridging the Gap: IT and OT Collaboration Issues</li><li>00:05:40 - Practical Solutions: Compensating Controls</li><li>00:06:48 - The Realities of IT and OT Convergence</li><li>00:09:00 - Shared Infrastructure Risks</li><li>00:12:00 - The Gap in Due Diligence on the Plant Floor</li><li>00:14:00 - The Need for Better OT Cybersecurity Practices</li><li>00:16:00 - Finger-Pointing in OT Environments</li><li>00:19:21 - Why Process Integrity Matters in OT</li><li>00:24:02 - Final Thoughts: Moving Forward in OT Security</li></ul><br/><p>Links And Resources:</p><ul><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/virtual-patching-and-micro-segmentation-securing-outdated-systems]]></link><guid isPermaLink="false">73e168d0-759e-4ab1-8b03-92bc1adf74e8</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 20 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/44af2d37-7fc1-4eae-975e-fbe7e9fb325f/ICSI-Ep-39-Final.mp3" length="67922643" type="audio/mpeg"/><itunes:duration>28:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode></item><item><title>The Human Factor : Securing Your Industrial Assets</title><itunes:title>The Human Factor : Securing Your Industrial Assets</itunes:title><description><![CDATA[<p>In this episode, Dino Busalachi and Craig Duckworth dive into the complexities of human factors and industrial cybersecurity. They discuss the need for robust cybersecurity awareness at all levels, and the challenges of integrating IT and OT environments. </p><p>The conversation highlights real-world scenarios, from phishing attacks to internal threats, and emphasizes the importance of building a strong cybersecurity culture. </p><p>Dino and Craig also explore strategies for improving visibility, managing remote access, and ensuring compliance with industry regulations, offering actionable insights for industrial professionals.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why Industrial Cybersecurity Matters</li><li>00:01:17 - The Human Element: Cybersecurity's Biggest Challenge</li><li>00:02:14 - Plant Floor Realities: Tackling Cyber Threats on the Ground</li><li>00:03:20 - Boosting Awareness: Training for a Secure Future</li><li>00:05:41 - Breaking Barriers: Overcoming OEM and IT Hurdles</li><li>00:08:10 - Culture Shift: Building a Cybersecurity-First Organization</li><li>00:09:32 - Top-Level Insight: Managing Executive Challenges and Costs</li><li>00:16:10 - Outsourcing Excellence: Best Practices for OT Cybersecurity</li><li>00:25:26 - Zero Trust Unpacked: Enhancing Cyber Hygiene</li><li>00:26:49 - Wrapping Up: Key Takeaways and Final Thoughts</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, Dino Busalachi and Craig Duckworth dive into the complexities of human factors and industrial cybersecurity. They discuss the need for robust cybersecurity awareness at all levels, and the challenges of integrating IT and OT environments. </p><p>The conversation highlights real-world scenarios, from phishing attacks to internal threats, and emphasizes the importance of building a strong cybersecurity culture. </p><p>Dino and Craig also explore strategies for improving visibility, managing remote access, and ensuring compliance with industry regulations, offering actionable insights for industrial professionals.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: Why Industrial Cybersecurity Matters</li><li>00:01:17 - The Human Element: Cybersecurity's Biggest Challenge</li><li>00:02:14 - Plant Floor Realities: Tackling Cyber Threats on the Ground</li><li>00:03:20 - Boosting Awareness: Training for a Secure Future</li><li>00:05:41 - Breaking Barriers: Overcoming OEM and IT Hurdles</li><li>00:08:10 - Culture Shift: Building a Cybersecurity-First Organization</li><li>00:09:32 - Top-Level Insight: Managing Executive Challenges and Costs</li><li>00:16:10 - Outsourcing Excellence: Best Practices for OT Cybersecurity</li><li>00:25:26 - Zero Trust Unpacked: Enhancing Cyber Hygiene</li><li>00:26:49 - Wrapping Up: Key Takeaways and Final Thoughts</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/managing-remote-access-securing-your-industrial-assets]]></link><guid isPermaLink="false">2add7820-da88-4913-8455-0ad947582e2a</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 06 Aug 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/d4bc80e7-ede7-4e2a-8b0f-6e2d4abbcafb/ICSI-Ep-38-Final.mp3" length="70776259" type="audio/mpeg"/><itunes:duration>29:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode></item><item><title>Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks</title><itunes:title>Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks</itunes:title><description><![CDATA[<p>Dino Busalachi sits down with Debbie Lay, Senior Solutions Architect from TXOne Networks, in this week's episode, to discuss challenges and innovative solutions in OT cybersecurity. </p><p>They cover the ongoing issues of outdated systems, the complexities of IT and OT convergence, and the benefits of virtual patching as a method for securing OT environments and legacy equipment. They also address the impact of the Crowdstrike event on Industrial OT environments.</p><p>Debbie shares her extensive experience and insights into how industries can safeguard their operations from ransomware and other threats without disrupting production. </p><p>This episode provides perspectives on managing cybersecurity in industrial environments, and the importance of collaboration between IT and OT teams. </p><p>Tune in to understand how virtual patching can be an effective approach to protect critical assets on the plant floor!</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to OT Cybersecurity</li><li>00:01:02 - Debbie Lay's Journey into OT Cybersecurity</li><li>00:02:13 - Challenges of Implementing IT Solutions in OT</li><li>00:04:17 - Virtual Patching in OT Environments: Securing Legacy Equipment</li><li>00:07:17 - IT and OT Convergence: Complexities and Solutions</li><li>00:08:21 - Bridging the IT-OT Gap: Importance of Collaboration</li><li>00:12:57 - TXOne Technologies for Enhancing OT Security</li><li>00:14:40 - The Impact of Cloud-Based Solutions on OT Operations</li><li>00:18:46 - Collaboration: A Critical Component in OT Security</li><li>00:20:12 - Industry Trends and Key Challenges in OT Cybersecurity</li><li>00:23:49 - Conclusion and Insights on Future Discussions</li></ul><br/><p>Links And Resources:</p><ul><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi sits down with Debbie Lay, Senior Solutions Architect from TXOne Networks, in this week's episode, to discuss challenges and innovative solutions in OT cybersecurity. </p><p>They cover the ongoing issues of outdated systems, the complexities of IT and OT convergence, and the benefits of virtual patching as a method for securing OT environments and legacy equipment. They also address the impact of the Crowdstrike event on Industrial OT environments.</p><p>Debbie shares her extensive experience and insights into how industries can safeguard their operations from ransomware and other threats without disrupting production. </p><p>This episode provides perspectives on managing cybersecurity in industrial environments, and the importance of collaboration between IT and OT teams. </p><p>Tune in to understand how virtual patching can be an effective approach to protect critical assets on the plant floor!</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to OT Cybersecurity</li><li>00:01:02 - Debbie Lay's Journey into OT Cybersecurity</li><li>00:02:13 - Challenges of Implementing IT Solutions in OT</li><li>00:04:17 - Virtual Patching in OT Environments: Securing Legacy Equipment</li><li>00:07:17 - IT and OT Convergence: Complexities and Solutions</li><li>00:08:21 - Bridging the IT-OT Gap: Importance of Collaboration</li><li>00:12:57 - TXOne Technologies for Enhancing OT Security</li><li>00:14:40 - The Impact of Cloud-Based Solutions on OT Operations</li><li>00:18:46 - Collaboration: A Critical Component in OT Security</li><li>00:20:12 - Industry Trends and Key Challenges in OT Cybersecurity</li><li>00:23:49 - Conclusion and Insights on Future Discussions</li></ul><br/><p>Links And Resources:</p><ul><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/with-senior-solutions-architect-of-txone-networks-debbie-lay]]></link><guid isPermaLink="false">8d953ff7-8d45-49b7-ab98-148d1ccb6e41</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 30 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a24f2aaa-8d4e-45a1-a66f-561793b4cbdb/Debbie-Lay-Final.mp3" length="59448520" type="audio/mpeg"/><itunes:duration>24:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode></item><item><title>Patch Management and Software Updates: IT versus OT</title><itunes:title>Patch Management and Software Updates: IT versus OT</itunes:title><description><![CDATA[<p>Craig and Dino dig into the differences and nuances of patch management and software updates comparing IT versus Operational Technology (OT) environments.&nbsp;</p><p>They explore the distinct challenges that OT systems face with software updates, and risks associated with patch management, including potential operational disruptions and risks of downtime.&nbsp;</p><p>They discuss the importance of IT understanding the OT risks and challenges of updating software and implementing patches to ICS and OT equipment. </p><p>The conversation highlights innovative solutions like virtual patching, the role of OEMs, and the critical need for a strategic, collaborative approach to cybersecurity in industrial settings.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Patching Challenges</li><li>00:01:08 - IT vs OT Patching: Key Differences</li><li>00:02:55 - Understanding the Cost of Downtime in OT</li><li>00:03:32 - Overcoming Challenges with Legacy Systems</li><li>00:05:21 - Navigating OEMs and Safety Concerns</li><li>00:06:45 - The Role of Safety in OT Patching</li><li>00:08:52 - Exploring Virtual Patching Solutions</li><li>00:13:11 - Enhancing Vendor Collaboration and Risk Management</li><li>00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity</li><li>00:18:33 - Addressing Insurance and Compliance Issues</li><li>00:20:12 - Significant Consequences of Not Patching</li><li>00:23:14 - Building an Effective Collaborative Cybersecurity Strategy</li><li>00:24:03 - Conclusion and Actionable Insights</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig and Dino dig into the differences and nuances of patch management and software updates comparing IT versus Operational Technology (OT) environments.&nbsp;</p><p>They explore the distinct challenges that OT systems face with software updates, and risks associated with patch management, including potential operational disruptions and risks of downtime.&nbsp;</p><p>They discuss the importance of IT understanding the OT risks and challenges of updating software and implementing patches to ICS and OT equipment. </p><p>The conversation highlights innovative solutions like virtual patching, the role of OEMs, and the critical need for a strategic, collaborative approach to cybersecurity in industrial settings.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Patching Challenges</li><li>00:01:08 - IT vs OT Patching: Key Differences</li><li>00:02:55 - Understanding the Cost of Downtime in OT</li><li>00:03:32 - Overcoming Challenges with Legacy Systems</li><li>00:05:21 - Navigating OEMs and Safety Concerns</li><li>00:06:45 - The Role of Safety in OT Patching</li><li>00:08:52 - Exploring Virtual Patching Solutions</li><li>00:13:11 - Enhancing Vendor Collaboration and Risk Management</li><li>00:16:48 - Impact of Mergers and Acquisitions on Cybersecurity</li><li>00:18:33 - Addressing Insurance and Compliance Issues</li><li>00:20:12 - Significant Consequences of Not Patching</li><li>00:23:14 - Building an Effective Collaborative Cybersecurity Strategy</li><li>00:24:03 - Conclusion and Actionable Insights</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/patching-and-updates-a-unified-approach-for-it-and-ot]]></link><guid isPermaLink="false">293a835b-897f-4c70-a495-919126ae7cfe</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 23 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5aa6c159-4eb9-4057-af2a-8fd0d22b2715/ICSI-Ep-36-Final.mp3" length="63234185" type="audio/mpeg"/><itunes:duration>26:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode></item><item><title>Future Trends in Industrial Cybersecurity with Sandeep Lota of Nozomi Networks</title><itunes:title>Future Trends in Industrial Cybersecurity with Sandeep Lota of Nozomi Networks</itunes:title><description><![CDATA[<p>In this episode, cybersecurity expert Sandeep Lota, Nozomi Networks Field CTO, joins Dino Busalachi to discuss the challenges and innovations in OT cybersecurity. </p><p>Key topics they explore include dealing with the evolution of OT security tools, the challenges with IT-OT convergence, and the increasing importance of continuous monitoring. </p><p>Sandeep also talks about the role of OEM partnerships and the rising trend of managed services. Tune in to stay ahead of the curve!</p><p>Chapters</p><ul><li>00:01:00 - Meet Sandeep Lota of Nozomi Networks</li><li>00:02:00 - Cybersecurity Journey and Milestones</li><li>00:03:00 - IT vs OT: The Convergence Challenge</li><li>00:05:00 - OEM Partnerships in Security</li><li>00:07:00 - Future Trends in OT Security</li><li>00:10:00 - Why Continuous Monitoring Matters</li><li>00:11:00 - The Boom in Managed Services</li><li>00:18:00 - Nozomi Networks' Global Impact</li><li>00:19:00 - Key Takeaways and Final Thoughts</li></ul><br/><p>Links And Resources:</p><ul><li>Sandeep Lota on <a href="https://www.linkedin.com/in/sandman007/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this episode, cybersecurity expert Sandeep Lota, Nozomi Networks Field CTO, joins Dino Busalachi to discuss the challenges and innovations in OT cybersecurity. </p><p>Key topics they explore include dealing with the evolution of OT security tools, the challenges with IT-OT convergence, and the increasing importance of continuous monitoring. </p><p>Sandeep also talks about the role of OEM partnerships and the rising trend of managed services. Tune in to stay ahead of the curve!</p><p>Chapters</p><ul><li>00:01:00 - Meet Sandeep Lota of Nozomi Networks</li><li>00:02:00 - Cybersecurity Journey and Milestones</li><li>00:03:00 - IT vs OT: The Convergence Challenge</li><li>00:05:00 - OEM Partnerships in Security</li><li>00:07:00 - Future Trends in OT Security</li><li>00:10:00 - Why Continuous Monitoring Matters</li><li>00:11:00 - The Boom in Managed Services</li><li>00:18:00 - Nozomi Networks' Global Impact</li><li>00:19:00 - Key Takeaways and Final Thoughts</li></ul><br/><p>Links And Resources:</p><ul><li>Sandeep Lota on <a href="https://www.linkedin.com/in/sandman007/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/icsi-ep-35]]></link><guid isPermaLink="false">96592385-69b4-42e5-b16a-c6b7eeb19c21</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 16 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa867c78-1567-4336-bf6d-2ae09ead3e46/ICSI-Ep-35-Sandeep-Final.mp3" length="53529173" type="audio/mpeg"/><itunes:duration>22:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode></item><item><title>Top Takeaways: Why IT and OT Must Unite Now</title><itunes:title>Top Takeaways: Why IT and OT Must Unite Now</itunes:title><description><![CDATA[<p>This episode focuses on the critical intersection of IT and OT in industrial cybersecurity. </p><p>Featuring discussions on strategic partnerships and validated designs, the episode addresses the challenges of data protection, digital safety, and asset inventory. </p><p>The conversation goes into how companies can better secure their operations by integrating IT and OT, leveraging new technologies, and improving operational efficiency. </p><p>The speakers also share insights on the evolving landscape of cybersecurity and the importance of collaboration between different departments within organizations to mitigate risks and ensure safety.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to Industrial Cybersecurity Insiders!</li><li>00:01:20 - <a href="https://open.spotify.com/episode/1fZvNwDxhgpoHNz3PGAwCh?si=WgEGADK2QdehcpcPhjBvdQ" rel="noopener noreferrer" target="_blank">Cybersecurity and Data Protection in Modern Manufacturing with Jim Fledderjohn, Dell Technologies</a> </li><li>00:07:12 - <a href="https://open.spotify.com/episode/5WIlXyhpTE0WNaPHPhcvBe?si=F_xdmYpjSo6pjzMACy_XSw" rel="noopener noreferrer" target="_blank">The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy</a></li><li>00:13:59 - <a href="https://open.spotify.com/episode/6CDSiXLb5zJMqPLQpNbjF9?si=RoexnBtrQ-Shpc_ataQ0Lw" rel="noopener noreferrer" target="_blank">Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks</a></li><li>00:23:21 - <a href="https://open.spotify.com/episode/5ryqqIogJFBejp4TvHjHeP?si=oPzza8-0SY6HAQDaW06Gfg" rel="noopener noreferrer" target="_blank">Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>This episode focuses on the critical intersection of IT and OT in industrial cybersecurity. </p><p>Featuring discussions on strategic partnerships and validated designs, the episode addresses the challenges of data protection, digital safety, and asset inventory. </p><p>The conversation goes into how companies can better secure their operations by integrating IT and OT, leveraging new technologies, and improving operational efficiency. </p><p>The speakers also share insights on the evolving landscape of cybersecurity and the importance of collaboration between different departments within organizations to mitigate risks and ensure safety.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to Industrial Cybersecurity Insiders!</li><li>00:01:20 - <a href="https://open.spotify.com/episode/1fZvNwDxhgpoHNz3PGAwCh?si=WgEGADK2QdehcpcPhjBvdQ" rel="noopener noreferrer" target="_blank">Cybersecurity and Data Protection in Modern Manufacturing with Jim Fledderjohn, Dell Technologies</a> </li><li>00:07:12 - <a href="https://open.spotify.com/episode/5WIlXyhpTE0WNaPHPhcvBe?si=F_xdmYpjSo6pjzMACy_XSw" rel="noopener noreferrer" target="_blank">The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy</a></li><li>00:13:59 - <a href="https://open.spotify.com/episode/6CDSiXLb5zJMqPLQpNbjF9?si=RoexnBtrQ-Shpc_ataQ0Lw" rel="noopener noreferrer" target="_blank">Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks</a></li><li>00:23:21 - <a href="https://open.spotify.com/episode/5ryqqIogJFBejp4TvHjHeP?si=oPzza8-0SY6HAQDaW06Gfg" rel="noopener noreferrer" target="_blank">Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady</a></li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/top-takeaways-why-it-and-ot-must-unite-now]]></link><guid isPermaLink="false">6e5886cb-0096-48a9-a488-9f30a59cc559</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 02 Jul 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/354de504-1203-4502-be2a-b5fe20ce4867/Ep-34-Highlight-Episode-Final.mp3" length="78545075" type="audio/mpeg"/><itunes:duration>32:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode></item><item><title>SEC Cybersecurity Rulings: Are Public Companies Really Ready?</title><itunes:title>SEC Cybersecurity Rulings: Are Public Companies Really Ready?</itunes:title><description><![CDATA[<p>Craig Duckworth and Dino Busalachi discuss the pressing issue of cybersecurity compliance for publicly traded companies under new SEC regulations. </p><p>They discuss the reasons behind the low number of reported breaches, including national security exemptions and potential corporate negligence. </p><p>Craig and Dino address the challenges companies face in safeguarding their operations, from inadequate incident response plans to the ins and outs of securing industrial control systems. </p><p>Tune in to understand why transparency and proactive measures are essential for protecting both companies and their investors.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: The True Cost of Cybersecurity Neglect</li><li>00:01:00 - Craig and Dino Unpack the SEC Rulings for Public Companies</li><li>00:02:29 - National Security Exemptions: A Double-Edged Sword</li><li>00:03:42 - The Complexities of Supply Chain Cybersecurity</li><li>00:05:32 - The CISO's Dilemma: Balancing Security and Operations</li><li>00:08:32 - Financial Fallout from Cybersecurity Failures</li><li>00:10:03 - Incompetence or Intentional? Unveiling Cybersecurity Failures</li><li>00:17:10 - The Role of Insurance in Cybersecurity Breach Mitigation</li><li>00:18:00 - Call to Action: Practical Steps to Improve Cybersecurity</li><li>00:21:47 - Conclusion and Final Thoughts: Taking Responsibility</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth and Dino Busalachi discuss the pressing issue of cybersecurity compliance for publicly traded companies under new SEC regulations. </p><p>They discuss the reasons behind the low number of reported breaches, including national security exemptions and potential corporate negligence. </p><p>Craig and Dino address the challenges companies face in safeguarding their operations, from inadequate incident response plans to the ins and outs of securing industrial control systems. </p><p>Tune in to understand why transparency and proactive measures are essential for protecting both companies and their investors.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: The True Cost of Cybersecurity Neglect</li><li>00:01:00 - Craig and Dino Unpack the SEC Rulings for Public Companies</li><li>00:02:29 - National Security Exemptions: A Double-Edged Sword</li><li>00:03:42 - The Complexities of Supply Chain Cybersecurity</li><li>00:05:32 - The CISO's Dilemma: Balancing Security and Operations</li><li>00:08:32 - Financial Fallout from Cybersecurity Failures</li><li>00:10:03 - Incompetence or Intentional? Unveiling Cybersecurity Failures</li><li>00:17:10 - The Role of Insurance in Cybersecurity Breach Mitigation</li><li>00:18:00 - Call to Action: Practical Steps to Improve Cybersecurity</li><li>00:21:47 - Conclusion and Final Thoughts: Taking Responsibility</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/sec-cybersecurity-rulings-are-public-companies-really-ready]]></link><guid isPermaLink="false">12caf3ec-0cd2-4872-951b-037679a9a61f</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 25 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/48653d9a-f0db-4c55-afac-705d87068713/Ep-33-Final.mp3" length="57787132" type="audio/mpeg"/><itunes:duration>24:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode></item><item><title>CISO Resignations: Is the Industrial Sector Prepared for the Fallout?</title><itunes:title>CISO Resignations: Is the Industrial Sector Prepared for the Fallout?</itunes:title><description><![CDATA[<p>Dino Busalachi and Craig Duckworth, CTO and CEO of Velta Technology, respectively, tackle the inherent risks of CISO resignations. </p><p>They discuss the immense stress and challenges that put these crucial roles at risk.</p><p>They talk about the unique struggles CISOs face in managing industrial cybersecurity, where outdated systems and a lack of authority compound their difficulties. </p><p>Dino and Craig also address the critical disconnect between IT and OT environments, the importance of on-the-ground involvement, and the need for a collaborative approach to secure industrial operations. </p><p>Tune in to understand why the role of a CISO has become untenable for many and what can be done to address this growing issue.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to the Unpatchable Environment: Why It's a Problem</li><li>00:01:39 - The Great Resignation of CISOs: Unveiling the Reasons</li><li>00:02:05 - Manufacturing's Unique Cybersecurity Struggles</li><li>00:03:08 - Stress and Responsibility: The CISO's Daily Battle</li><li>00:04:13 - Modern Cybersecurity: Why It's So Complex</li><li>00:05:00 - IT vs. Plant Management: Bridging the Gap</li><li>00:07:06 - Senior Leadership's Role in Cybersecurity: Are They Doing Enough?</li><li>00:08:39 - IT and OT Collaboration: The Key to Security</li><li>00:10:12 - Third-Party OT Suppliers: A Hidden Risk</li><li>00:12:00 - The Wild West of Cyber-Physical Connections</li><li>00:14:23 - Regulations and Realities: Why Compliance Falls Short</li><li>00:16:40 - The Reality of Cybersecurity Threats: What You Need to Know</li><li>00:20:00 - Flat Networks: The Hidden Danger</li><li>00:23:38 - Conclusion: A Call to Action for CISOs</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi and Craig Duckworth, CTO and CEO of Velta Technology, respectively, tackle the inherent risks of CISO resignations. </p><p>They discuss the immense stress and challenges that put these crucial roles at risk.</p><p>They talk about the unique struggles CISOs face in managing industrial cybersecurity, where outdated systems and a lack of authority compound their difficulties. </p><p>Dino and Craig also address the critical disconnect between IT and OT environments, the importance of on-the-ground involvement, and the need for a collaborative approach to secure industrial operations. </p><p>Tune in to understand why the role of a CISO has become untenable for many and what can be done to address this growing issue.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to the Unpatchable Environment: Why It's a Problem</li><li>00:01:39 - The Great Resignation of CISOs: Unveiling the Reasons</li><li>00:02:05 - Manufacturing's Unique Cybersecurity Struggles</li><li>00:03:08 - Stress and Responsibility: The CISO's Daily Battle</li><li>00:04:13 - Modern Cybersecurity: Why It's So Complex</li><li>00:05:00 - IT vs. Plant Management: Bridging the Gap</li><li>00:07:06 - Senior Leadership's Role in Cybersecurity: Are They Doing Enough?</li><li>00:08:39 - IT and OT Collaboration: The Key to Security</li><li>00:10:12 - Third-Party OT Suppliers: A Hidden Risk</li><li>00:12:00 - The Wild West of Cyber-Physical Connections</li><li>00:14:23 - Regulations and Realities: Why Compliance Falls Short</li><li>00:16:40 - The Reality of Cybersecurity Threats: What You Need to Know</li><li>00:20:00 - Flat Networks: The Hidden Danger</li><li>00:23:38 - Conclusion: A Call to Action for CISOs</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ciso-resignations-is-the-industrial-sector-prepared-for-the-fallout]]></link><guid isPermaLink="false">7ff6fe7e-9ec8-4188-aa87-935ea10f43db</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 18 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9266e35b-2f31-40ba-9f7b-16dc40a33d90/Ep-32-Final.mp3" length="60792259" type="audio/mpeg"/><itunes:duration>25:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode></item><item><title>Exposing the Gaps: Railway Systems and Cyber Threats with Miki Shifman, Co-Founder and CTO of Cylus</title><itunes:title>Exposing the Gaps: Railway Systems and Cyber Threats with Miki Shifman, Co-Founder and CTO of Cylus</itunes:title><description><![CDATA[<p>Miki Shifman, co-founder and CTO of Cylus, shares his perspective on the unique cybersecurity challenges in the railway industry. </p><p>They discuss the need for specialized security measures to protect the complex and vulnerable rail systems. </p><p>Miki shares insights on how Cylus has developed solutions tailored to this sector, addressing both current gaps and future threats. </p><p>They discuss the importance of automation in security processes and the evolving landscape of rail safety.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to Industrial Cybersecurity Insider</li><li>00:01:03 - Introducing Dino Boussalaki and Mickey Schiffman</li><li>00:01:56 - Tackling the Unique Cybersecurity Challenges in Railways</li><li>00:02:52 - Why Generic OT Security Doesn't Cut It for Rail Systems</li><li>00:05:37 - Ensuring Safety and Process Integrity in Rail Operations</li><li>00:07:45 - Overcoming the Reluctance to Change in Rail Cybersecurity</li><li>00:10:22 - Navigating Government Regulations and Security Controls</li><li>00:11:56 - How OEMs are Adapting to New Cybersecurity Demands</li><li>00:13:45 - Implementing Security Without Disrupting Operations</li><li>00:17:30 - The Evolution of OEM Security Practices in Rail Systems</li><li>00:20:00 - Cybersecurity Insurance: What Rail Operators Need to Know</li><li>00:21:53 - Closing Insights and Essential Takeaways</li></ul><br/><p>Links And Resources:</p><ul><li>Miki on <a href="https://www.linkedin.com/in/miki-shifman-5a5756123" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.cylus.com/company" rel="noopener noreferrer" target="_blank">Cylus</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Miki Shifman, co-founder and CTO of Cylus, shares his perspective on the unique cybersecurity challenges in the railway industry. </p><p>They discuss the need for specialized security measures to protect the complex and vulnerable rail systems. </p><p>Miki shares insights on how Cylus has developed solutions tailored to this sector, addressing both current gaps and future threats. </p><p>They discuss the importance of automation in security processes and the evolving landscape of rail safety.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to Industrial Cybersecurity Insider</li><li>00:01:03 - Introducing Dino Boussalaki and Mickey Schiffman</li><li>00:01:56 - Tackling the Unique Cybersecurity Challenges in Railways</li><li>00:02:52 - Why Generic OT Security Doesn't Cut It for Rail Systems</li><li>00:05:37 - Ensuring Safety and Process Integrity in Rail Operations</li><li>00:07:45 - Overcoming the Reluctance to Change in Rail Cybersecurity</li><li>00:10:22 - Navigating Government Regulations and Security Controls</li><li>00:11:56 - How OEMs are Adapting to New Cybersecurity Demands</li><li>00:13:45 - Implementing Security Without Disrupting Operations</li><li>00:17:30 - The Evolution of OEM Security Practices in Rail Systems</li><li>00:20:00 - Cybersecurity Insurance: What Rail Operators Need to Know</li><li>00:21:53 - Closing Insights and Essential Takeaways</li></ul><br/><p>Links And Resources:</p><ul><li>Miki on <a href="https://www.linkedin.com/in/miki-shifman-5a5756123" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.cylus.com/company" rel="noopener noreferrer" target="_blank">Cylus</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/exposing-the-gaps-railway-systems-and-cyber-threats-with-miki-shifman-co-founder-and-cto-of-cylus]]></link><guid isPermaLink="false">614fe01e-36a8-455b-a1fe-6d4d487cf21e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 11 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/08e6112e-0e8e-45f6-a1c5-afd77e68dbfa/Episode-31-Miki-Schifman-Final.mp3" length="58241663" type="audio/mpeg"/><itunes:duration>24:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode></item><item><title>The Air Gap Myth: How Misinformation Is Endangering Your Plant Floor</title><itunes:title>The Air Gap Myth: How Misinformation Is Endangering Your Plant Floor</itunes:title><description><![CDATA[<p>In this week's episode, Dino and Jim, CTO and COO for Velta Technology, discuss the misconceptions surrounding the security of operational technology in industrial settings. </p><p>They debunk the common belief around air-gapped systems, explaining how these are usually not as isolated as many think. </p><p>Dino and Jim talk about real-world examples of oversight and communication gaps that compromise plant operational security, stressing the need for better collaboration between IT and operational staff to safeguard critical infrastructure. </p><p>They also address the struggles of implementing cybersecurity measures on the plant floor, which are absolutely necessary to prevent costly downtime and protect against external threats.</p><p>Chapters:</p><ul><li>00:00:00 - Kickoff: Unpacking Industrial Cybersecurity</li><li>00:00:51 - Introducing Your Guides: Dino and Jim</li><li>00:01:13 - Myth Busting: The Truth About OT Air Gaps</li><li>00:02:08 - Tales from the Plant Floor: Examples of Miscommunication</li><li>00:04:47 - Connectivity Challenges: The Realities of Remote Support</li><li>00:06:25 - The High Cost of Downtime: Strategies for Effective Remote Access</li><li>00:07:38 - Securing the Plant: Cybersecurity’s Critical Role in Operations</li><li>00:11:59 - Initiating the Hunt: Identifying and Closing Security Gaps</li><li>00:14:07 - Navigating Complex Plant Networks: Mergers, Acquisitions, and Legacy Systems</li><li>00:16:33 - Cybersecurity Ownership: Who's in Charge Here?</li><li>00:18:58 - Building Cybersecurity Practices in OT Supplier Networks</li><li>00:20:45 - Supply Chain Security: Bridging the Gap Between IT and OT</li><li>00:22:21 - On-the-Ground Insights: Practical Steps for Securing Industrial Environments</li><li>00:24:02 - The Crucial Role of Continuous Monitoring in Cybersecurity</li><li>00:26:09 - Closing Insights: Key Takeaways and Future Directions</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Dino and Jim, CTO and COO for Velta Technology, discuss the misconceptions surrounding the security of operational technology in industrial settings. </p><p>They debunk the common belief around air-gapped systems, explaining how these are usually not as isolated as many think. </p><p>Dino and Jim talk about real-world examples of oversight and communication gaps that compromise plant operational security, stressing the need for better collaboration between IT and operational staff to safeguard critical infrastructure. </p><p>They also address the struggles of implementing cybersecurity measures on the plant floor, which are absolutely necessary to prevent costly downtime and protect against external threats.</p><p>Chapters:</p><ul><li>00:00:00 - Kickoff: Unpacking Industrial Cybersecurity</li><li>00:00:51 - Introducing Your Guides: Dino and Jim</li><li>00:01:13 - Myth Busting: The Truth About OT Air Gaps</li><li>00:02:08 - Tales from the Plant Floor: Examples of Miscommunication</li><li>00:04:47 - Connectivity Challenges: The Realities of Remote Support</li><li>00:06:25 - The High Cost of Downtime: Strategies for Effective Remote Access</li><li>00:07:38 - Securing the Plant: Cybersecurity’s Critical Role in Operations</li><li>00:11:59 - Initiating the Hunt: Identifying and Closing Security Gaps</li><li>00:14:07 - Navigating Complex Plant Networks: Mergers, Acquisitions, and Legacy Systems</li><li>00:16:33 - Cybersecurity Ownership: Who's in Charge Here?</li><li>00:18:58 - Building Cybersecurity Practices in OT Supplier Networks</li><li>00:20:45 - Supply Chain Security: Bridging the Gap Between IT and OT</li><li>00:22:21 - On-the-Ground Insights: Practical Steps for Securing Industrial Environments</li><li>00:24:02 - The Crucial Role of Continuous Monitoring in Cybersecurity</li><li>00:26:09 - Closing Insights: Key Takeaways and Future Directions</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cyber-blind-spots-how-misinformation-is-endangering-your-plant-floor]]></link><guid isPermaLink="false">bb98f69e-dacb-4b12-93bf-2f5fdb06cb8e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 04 Jun 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b7e36be0-c721-424d-836f-fb762eec212e/Ep-30-Final.mp3" length="72287181" type="audio/mpeg"/><itunes:duration>30:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode></item><item><title>Why Preventative Cybersecurity is the Future with Ed Turkaly, Schneider Electric’s Cybersecurity Management Director</title><itunes:title>Why Preventative Cybersecurity is the Future with Ed Turkaly, Schneider Electric’s Cybersecurity Management Director</itunes:title><description><![CDATA[<p>Ed Turkaly, Cybersecurity Offer Management Director at Schneider Electric, discusses the convergence of IT and OT in industrial cybersecurity. </p><p>Ed talks about the challenges and strategies for securing critical infrastructures, focusing on the importance of proactive measures over mere detection. </p><p>He shares insights into Schneider Electric's innovative approaches to integrating cybersecurity solutions into their offerings, discussing the necessity of collaboration between IT and OT. </p><p>Ed also talks about addressing the complexities of industrial cybersecurity, making this episode a must-listen for anyone interested in the future of digital security.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Industrial Cybersecurity</li><li>00:01:13 - Ed Turkaly's Cybersecurity Journey</li><li>00:02:14 - Building Trust and Understanding Cybersecurity Needs</li><li>00:04:59 - Bridging the Gap: IT and OT Convergence in Cybersecurity</li><li>00:06:50 - Addressing OT Cybersecurity Challenges and Misconceptions</li><li>00:09:38 - The Role of Cybersecurity Insurance in Modern Business</li><li>00:10:38 - Schneider Electric’s Cybersecurity Strategies</li><li>00:14:10 - Partnering and Certification in Cybersecurity Solutions</li><li>00:16:17 - Client Engagement and Effective Cybersecurity Strategy</li><li>00:19:00 - Moving from Visibility to Prevention</li><li>00:22:00 - Importance of OEM Partnerships in Cybersecurity</li><li>00:24:38 - Future Trends in Preventative Cybersecurity Measures</li></ul><br/><p>Links And Resources:</p><ul><li>Ed on <a href="https://www.linkedin.com/in/edward-t-aa64877/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.se.com/ww/en/" rel="noopener noreferrer" target="_blank">Schneider Electric</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Ed Turkaly, Cybersecurity Offer Management Director at Schneider Electric, discusses the convergence of IT and OT in industrial cybersecurity. </p><p>Ed talks about the challenges and strategies for securing critical infrastructures, focusing on the importance of proactive measures over mere detection. </p><p>He shares insights into Schneider Electric's innovative approaches to integrating cybersecurity solutions into their offerings, discussing the necessity of collaboration between IT and OT. </p><p>Ed also talks about addressing the complexities of industrial cybersecurity, making this episode a must-listen for anyone interested in the future of digital security.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Industrial Cybersecurity</li><li>00:01:13 - Ed Turkaly's Cybersecurity Journey</li><li>00:02:14 - Building Trust and Understanding Cybersecurity Needs</li><li>00:04:59 - Bridging the Gap: IT and OT Convergence in Cybersecurity</li><li>00:06:50 - Addressing OT Cybersecurity Challenges and Misconceptions</li><li>00:09:38 - The Role of Cybersecurity Insurance in Modern Business</li><li>00:10:38 - Schneider Electric’s Cybersecurity Strategies</li><li>00:14:10 - Partnering and Certification in Cybersecurity Solutions</li><li>00:16:17 - Client Engagement and Effective Cybersecurity Strategy</li><li>00:19:00 - Moving from Visibility to Prevention</li><li>00:22:00 - Importance of OEM Partnerships in Cybersecurity</li><li>00:24:38 - Future Trends in Preventative Cybersecurity Measures</li></ul><br/><p>Links And Resources:</p><ul><li>Ed on <a href="https://www.linkedin.com/in/edward-t-aa64877/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.se.com/ww/en/" rel="noopener noreferrer" target="_blank">Schneider Electric</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/why-preventative-cybersecurity-is-the-future-with-schneider-electrics-cybersecurity-management-director-ed-turkaly]]></link><guid isPermaLink="false">de5fc7a5-47d7-4e9a-8878-fb63f9d56675</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 28 May 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/cb471f4d-c38b-4b0f-9747-750562fba72b/Turkaly-Schneider-Electric-Final.mp3" length="68971720" type="audio/mpeg"/><itunes:duration>28:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode></item><item><title>The Truth About IT / OT Convergence with Andrew McPhee - Cisco</title><itunes:title>The Truth About IT / OT Convergence with Andrew McPhee - Cisco</itunes:title><description><![CDATA[<p>Cisco lead OT Security Solution Architect Andrew McPhee, sheds light on the often overlooked and misunderstood world of OT cybersecurity. He explains the complexities of combining IT and OT environments, emphasizing the hidden risks many industrial networks face. </p><p>Through real-world examples, Andrew reveals the dangers posed by outdated protocols and the importance of proper network segmentation and visibility in preventing costly shutdowns. With a mix of expert insights and practical advice, this episode is a wake-up call for those involved in maintaining and securing industrial control systems. </p><p>Don’t miss Andrew's eye-opening take on why your network might not be as secure as you think—and what you can do about it.</p><p>Chapters:</p><ul><li>00:00:00 - Intro: Why IT Is Crucial for OT Network Success and Meet Andrew McPhee</li><li>00:01:39 - Inside the Job: What a Solution Architect Does</li><li>00:02:26 - Overcoming IT and OT Integration Hurdles</li><li>00:04:42 - Closing the IT and OT Skills Gap</li><li>00:06:00 - Real-World Examples of Skill Challenges</li><li>00:07:25 - Why Networking Knowledge is Essential in OT</li><li>00:08:40 - IT and OT: Different Worlds, Common Goals</li><li>00:09:30 - Training IT for OT: The Benefits and Hurdles</li><li>00:10:08 - Cisco's Journey in Industrial Networking</li><li>00:14:05 - New Cybersecurity Regulations: What They Mean for You</li><li>00:16:32 - Unpacking Cisco Cyber Vision: A Game Changer for OT Security</li><li>00:16:32 - Unpacking Cisco Cyber Vision: A Game Changer for OT Security</li><li>00:18:00 - How Cyber Vision Identifies Vulnerabilities</li><li>00:19:15 - Success Stories: Cyber Vision in Action</li><li>00:20:45 - The Importance of Visibility in OT Networks</li><li>00:22:10 - Balancing Passive and Active Network Monitoring</li><li>00:23:35 - Enhancing Security with Native Protocols</li><li>00:25:00 - The Role of Cyber Vision in Regulatory Compliance</li><li>00:26:20 - Preparing for Future Cybersecurity Threats</li><li>00:27:39 - AI's Potential in Strengthening OT Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Andrew on <a href="https://www.linkedin.com/in/andrew-mcphee-cisco/?originalSubdomain=ie" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.cisco.com/" rel="noopener noreferrer" target="_blank">Cisco</a> </li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Cisco lead OT Security Solution Architect Andrew McPhee, sheds light on the often overlooked and misunderstood world of OT cybersecurity. He explains the complexities of combining IT and OT environments, emphasizing the hidden risks many industrial networks face. </p><p>Through real-world examples, Andrew reveals the dangers posed by outdated protocols and the importance of proper network segmentation and visibility in preventing costly shutdowns. With a mix of expert insights and practical advice, this episode is a wake-up call for those involved in maintaining and securing industrial control systems. </p><p>Don’t miss Andrew's eye-opening take on why your network might not be as secure as you think—and what you can do about it.</p><p>Chapters:</p><ul><li>00:00:00 - Intro: Why IT Is Crucial for OT Network Success and Meet Andrew McPhee</li><li>00:01:39 - Inside the Job: What a Solution Architect Does</li><li>00:02:26 - Overcoming IT and OT Integration Hurdles</li><li>00:04:42 - Closing the IT and OT Skills Gap</li><li>00:06:00 - Real-World Examples of Skill Challenges</li><li>00:07:25 - Why Networking Knowledge is Essential in OT</li><li>00:08:40 - IT and OT: Different Worlds, Common Goals</li><li>00:09:30 - Training IT for OT: The Benefits and Hurdles</li><li>00:10:08 - Cisco's Journey in Industrial Networking</li><li>00:14:05 - New Cybersecurity Regulations: What They Mean for You</li><li>00:16:32 - Unpacking Cisco Cyber Vision: A Game Changer for OT Security</li><li>00:16:32 - Unpacking Cisco Cyber Vision: A Game Changer for OT Security</li><li>00:18:00 - How Cyber Vision Identifies Vulnerabilities</li><li>00:19:15 - Success Stories: Cyber Vision in Action</li><li>00:20:45 - The Importance of Visibility in OT Networks</li><li>00:22:10 - Balancing Passive and Active Network Monitoring</li><li>00:23:35 - Enhancing Security with Native Protocols</li><li>00:25:00 - The Role of Cyber Vision in Regulatory Compliance</li><li>00:26:20 - Preparing for Future Cybersecurity Threats</li><li>00:27:39 - AI's Potential in Strengthening OT Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Andrew on <a href="https://www.linkedin.com/in/andrew-mcphee-cisco/?originalSubdomain=ie" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.cisco.com/" rel="noopener noreferrer" target="_blank">Cisco</a> </li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-truth-about-it-ot-convergence-with-andrew-mcphee-cisco]]></link><guid isPermaLink="false">1403cc18-c354-41f1-ae9e-966fa3ab99f0</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 21 May 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a016547d-029d-4d4e-8108-b6acf0538665/Andrew-McPhee-Final.mp3" length="61146688" type="audio/mpeg"/><itunes:duration>31:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode></item><item><title>Hidden Dangers in Your Devices: Exposing xIoT&apos;s Dark Side with John Vecchi, Phosphorous CMO</title><itunes:title>Hidden Dangers in Your Devices: Exposing xIoT&apos;s Dark Side with John Vecchi, Phosphorous CMO</itunes:title><description><![CDATA[<p>John Vecchi, CMO of Phosphorus Cybersecurity, gives us a look into the rapidly evolving landscape of xIoT security, revealing the hidden vulnerabilities within our everyday devices. </p><p>From casinos to hospitals, John breaks down the immense challenges and critical risks facing industries reliant on interconnected technology. </p><p>With a mix of personal experiences and expert insights, he offers a roadmap for strengthening defenses against increasingly sophisticated cyber threats.</p><p>Tune in to uncover how the unseen intricacies of IoT can impact security and what steps can be taken to safeguard our digital and physical worlds against the invisible dangers lurking within our connected devices.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: The Critical Need for Cybersecurity Visibility</li><li>00:01:07 - Meet John Vecchi: Champion of Cybersecurity at Phosphorus</li><li>00:02:01 - Unveiling IoT: Its Role Across Industries from Gaming to Healthcare</li><li>00:03:15 - Case Study: Gaming Industry and IoT Vulnerabilities</li><li>00:04:30 - Discussion on Cyber Attacks in Recent Times</li><li>00:05:45 - The Expanding Threat Landscape in IoT</li><li>00:07:00 - John Vecchi's Insights on Preventative Security Measures</li><li>00:08:26 - Spotlight on Security: Tackling IoT's Hidden Vulnerabilities</li><li>00:11:24 - Blueprints for Defense: Effective Strategies to Secure IoT</li><li>00:13:50 - The Role of Default Credentials in IoT Security</li><li>00:15:35 - Firmware Updates: A Necessary Step in IoT Protection</li><li>00:17:10 - Addressing the Challenges of Patch Management</li><li>00:19:05 - Real-World Examples of Effective IoT Security Enhancements</li><li>00:22:30 - Seeing the Unseen: Why Knowing Your Digital Terrain is Vital</li><li>00:24:50 - Importance of Visibility in Cybersecurity</li><li>00:26:40 - John Vecchi on Cybersecurity Best Practices</li><li>00:28:15 - Future Trends in IoT and Cybersecurity</li><li>00:30:00 - Concluding Thoughts: Securing IoT for Tomorrow</li><li>00:32:02 - Wrapping Up: Key Takeaways and Looking Ahead in IoT Security</li></ul><br/><p>Links And Resources:</p><ul><li>John Vecchi on <a href="https://www.linkedin.com/in/johnvecchi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://phosphorus.io/" rel="noopener noreferrer" target="_blank">Phosphorus</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>John Vecchi, CMO of Phosphorus Cybersecurity, gives us a look into the rapidly evolving landscape of xIoT security, revealing the hidden vulnerabilities within our everyday devices. </p><p>From casinos to hospitals, John breaks down the immense challenges and critical risks facing industries reliant on interconnected technology. </p><p>With a mix of personal experiences and expert insights, he offers a roadmap for strengthening defenses against increasingly sophisticated cyber threats.</p><p>Tune in to uncover how the unseen intricacies of IoT can impact security and what steps can be taken to safeguard our digital and physical worlds against the invisible dangers lurking within our connected devices.</p><p>Chapters:</p><ul><li>00:00:00 - Kicking Off: The Critical Need for Cybersecurity Visibility</li><li>00:01:07 - Meet John Vecchi: Champion of Cybersecurity at Phosphorus</li><li>00:02:01 - Unveiling IoT: Its Role Across Industries from Gaming to Healthcare</li><li>00:03:15 - Case Study: Gaming Industry and IoT Vulnerabilities</li><li>00:04:30 - Discussion on Cyber Attacks in Recent Times</li><li>00:05:45 - The Expanding Threat Landscape in IoT</li><li>00:07:00 - John Vecchi's Insights on Preventative Security Measures</li><li>00:08:26 - Spotlight on Security: Tackling IoT's Hidden Vulnerabilities</li><li>00:11:24 - Blueprints for Defense: Effective Strategies to Secure IoT</li><li>00:13:50 - The Role of Default Credentials in IoT Security</li><li>00:15:35 - Firmware Updates: A Necessary Step in IoT Protection</li><li>00:17:10 - Addressing the Challenges of Patch Management</li><li>00:19:05 - Real-World Examples of Effective IoT Security Enhancements</li><li>00:22:30 - Seeing the Unseen: Why Knowing Your Digital Terrain is Vital</li><li>00:24:50 - Importance of Visibility in Cybersecurity</li><li>00:26:40 - John Vecchi on Cybersecurity Best Practices</li><li>00:28:15 - Future Trends in IoT and Cybersecurity</li><li>00:30:00 - Concluding Thoughts: Securing IoT for Tomorrow</li><li>00:32:02 - Wrapping Up: Key Takeaways and Looking Ahead in IoT Security</li></ul><br/><p>Links And Resources:</p><ul><li>John Vecchi on <a href="https://www.linkedin.com/in/johnvecchi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://phosphorus.io/" rel="noopener noreferrer" target="_blank">Phosphorus</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/hidden-dangers-in-your-devices-exposing-iots-dark-side-with-john-vecchi-of-phosphorus-cybersecurity]]></link><guid isPermaLink="false">349912fb-bdbf-4eae-8095-37dfd37a4a2b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 14 May 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/aecf79d2-4400-46db-9521-86644530ae56/John-Vecchi-Final.mp3" length="64374169" type="audio/mpeg"/><itunes:duration>33:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode></item><item><title>Building the Case for Cybersecurity Funding</title><itunes:title>Building the Case for Cybersecurity Funding</itunes:title><description><![CDATA[<p>Craig Duckworth and Jim Cook discuss the critical yet often overlooked topic of budgeting for operational technology (OT) cybersecurity. </p><p>Throughout their discussion, they address the challenges and necessities of securing funding from executive teams, framing the conversation around liability, risk management, and the dire need for strategic investment to safeguard critical infrastructure. </p><p>They highlight the nuanced divide between IT and OT responsibilities and emphasize the vital role of clear communication in making cybersecurity a top priority for corporate budgeting. </p><p>By exploring real-world scenarios and the potential consequences of neglecting cybersecurity in OT, this episode serves as a compelling call to action for organizations to reassess their approach to cybersecurity funding and strategy, ensuring they are adequately prepared to handle emerging threats in an increasingly connected world.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to Velta Technology: Introductions and Today's Focus</li><li>00:01:31 - Navigating the Budget Cycle for OT Cybersecurity</li><li>00:02:11 - Bridging the IT-OT Divide: Whose Responsibility Is Cybersecurity?</li><li>00:04:51 - Building the Business Case for OT Cybersecurity Funding</li><li>00:09:49 - Understanding the Real-World Impacts of Cybersecurity Failures</li><li>00:11:43 - Strategies for Addressing OT Cybersecurity: From Awareness to Action</li><li>00:16:03 - Leveraging Technology and Building Capability for Cybersecurity</li><li>00:20:58 - Making the Case to Executives: Risk Management and Cybersecurity Insurance</li><li>00:22:41 - Exploring Options and Taking Action Against Cybersecurity Threats</li><li>00:28:12 - Navigating Cyber Insurance: Adjusting to New Realities in Risk Coverage</li><li>00:33:37 - Concluding Thoughts: The Importance of Starting Cybersecurity Initiatives</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth and Jim Cook discuss the critical yet often overlooked topic of budgeting for operational technology (OT) cybersecurity. </p><p>Throughout their discussion, they address the challenges and necessities of securing funding from executive teams, framing the conversation around liability, risk management, and the dire need for strategic investment to safeguard critical infrastructure. </p><p>They highlight the nuanced divide between IT and OT responsibilities and emphasize the vital role of clear communication in making cybersecurity a top priority for corporate budgeting. </p><p>By exploring real-world scenarios and the potential consequences of neglecting cybersecurity in OT, this episode serves as a compelling call to action for organizations to reassess their approach to cybersecurity funding and strategy, ensuring they are adequately prepared to handle emerging threats in an increasingly connected world.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to Velta Technology: Introductions and Today's Focus</li><li>00:01:31 - Navigating the Budget Cycle for OT Cybersecurity</li><li>00:02:11 - Bridging the IT-OT Divide: Whose Responsibility Is Cybersecurity?</li><li>00:04:51 - Building the Business Case for OT Cybersecurity Funding</li><li>00:09:49 - Understanding the Real-World Impacts of Cybersecurity Failures</li><li>00:11:43 - Strategies for Addressing OT Cybersecurity: From Awareness to Action</li><li>00:16:03 - Leveraging Technology and Building Capability for Cybersecurity</li><li>00:20:58 - Making the Case to Executives: Risk Management and Cybersecurity Insurance</li><li>00:22:41 - Exploring Options and Taking Action Against Cybersecurity Threats</li><li>00:28:12 - Navigating Cyber Insurance: Adjusting to New Realities in Risk Coverage</li><li>00:33:37 - Concluding Thoughts: The Importance of Starting Cybersecurity Initiatives</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/building-the-case-for-cybersecurity-funding]]></link><guid isPermaLink="false">d1a35a19-1020-4baa-9ab4-5873edb20e18</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 07 May 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/26771f2b-74eb-4dd4-b38f-3ee4756f5da3/Ep-26-Craig-and-Jim-Final.mp3" length="68475185" type="audio/mpeg"/><itunes:duration>35:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode></item><item><title>Zero Trust : IT versus OT with Dino Busalachi and Jim Cook</title><itunes:title>Zero Trust : IT versus OT with Dino Busalachi and Jim Cook</itunes:title><description><![CDATA[<p>Enjoy this episode as Dino Busalachi, CTO and Co-Founder of Velta Technology, and Jim Cook, COO of Velta Technology, have a discussion about the complexities and challenges of using Zero Trust security frameworks within operational technology (OT) environments. </p><p>They explore the nuanced differences between IT and OT landscapes, pointing out the different challenges that arise when applying IT-centric security strategies to the distinct and varied needs of industrial settings. </p><p>From the more straightforward IT Zero Trust framework to the complexities of trying to apply that approach and managing system vulnerabilities on the OT side, the conversation offers a rich combination of technical insight and real-world applications. </p><p>If you’re involved in the intersecting worlds of IT and industrial operations, this episode is sure to provide valuable lessons on securing technological infrastructures against modern threats while considering the operational realities of the plant floor.</p><p>Chapters:</p><ul><li>00:00:00 - Kickoff: The High Stakes of Zero Trust in OT</li><li>00:03:09 - Tracing the Roots: How Zero Trust Evolves with Network Security</li><li>00:04:17 - The Rise of AI and Its Influence on Security</li><li>00:06:50 - Operational Challenges with Applying New IT Frameworks</li><li>00:08:12 - Zero Trust's Fit with Industrial Protocols</li><li>00:10:28 - The OT Challenge: Applying the Bucket Strategy for Zero Trust</li><li>00:12:03 - Addressing Network Segmentation in OT</li><li>00:14:00 - Challenges with VPNs and Remote Access in Zero Trust</li><li>00:16:45 - Potential Misalignments in Applying IT Security to OT</li><li>00:17:46 - Identity Crisis: Managing Access Within Zero Trust Frameworks</li><li>00:19:12 - Implications of Shared Passwords and User Access</li><li>00:23:04 - Strategic Collaboration Between IT and OT for Enhanced Security</li><li>00:26:32 - Wrap-Up: Collaborative Paths to Effective Zero Trust in OT</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Enjoy this episode as Dino Busalachi, CTO and Co-Founder of Velta Technology, and Jim Cook, COO of Velta Technology, have a discussion about the complexities and challenges of using Zero Trust security frameworks within operational technology (OT) environments. </p><p>They explore the nuanced differences between IT and OT landscapes, pointing out the different challenges that arise when applying IT-centric security strategies to the distinct and varied needs of industrial settings. </p><p>From the more straightforward IT Zero Trust framework to the complexities of trying to apply that approach and managing system vulnerabilities on the OT side, the conversation offers a rich combination of technical insight and real-world applications. </p><p>If you’re involved in the intersecting worlds of IT and industrial operations, this episode is sure to provide valuable lessons on securing technological infrastructures against modern threats while considering the operational realities of the plant floor.</p><p>Chapters:</p><ul><li>00:00:00 - Kickoff: The High Stakes of Zero Trust in OT</li><li>00:03:09 - Tracing the Roots: How Zero Trust Evolves with Network Security</li><li>00:04:17 - The Rise of AI and Its Influence on Security</li><li>00:06:50 - Operational Challenges with Applying New IT Frameworks</li><li>00:08:12 - Zero Trust's Fit with Industrial Protocols</li><li>00:10:28 - The OT Challenge: Applying the Bucket Strategy for Zero Trust</li><li>00:12:03 - Addressing Network Segmentation in OT</li><li>00:14:00 - Challenges with VPNs and Remote Access in Zero Trust</li><li>00:16:45 - Potential Misalignments in Applying IT Security to OT</li><li>00:17:46 - Identity Crisis: Managing Access Within Zero Trust Frameworks</li><li>00:19:12 - Implications of Shared Passwords and User Access</li><li>00:23:04 - Strategic Collaboration Between IT and OT for Enhanced Security</li><li>00:26:32 - Wrap-Up: Collaborative Paths to Effective Zero Trust in OT</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-it-versus-ot-dino-jim]]></link><guid isPermaLink="false">270ad0d4-8d4e-4b50-8e5c-b1c7f8aaef4c</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 30 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/989f5860-4dfe-4461-ab3c-e232d965c421/Ep-25-Final.mp3" length="53066701" type="audio/mpeg"/><itunes:duration>27:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode></item><item><title>Overcoming Obstacles in Diverse Technological Landscapes with CEO and Co-Founder of Garland Technology, Chris Bihary</title><itunes:title>Overcoming Obstacles in Diverse Technological Landscapes with CEO and Co-Founder of Garland Technology, Chris Bihary</itunes:title><description><![CDATA[<p>Join your host, CEO and President of Velta Technology, Craig Duckworth and special guest Chris Bihary, CEO and co-founder of Garland Technology, as they discuss the complexities of operational technology (OT) security within critical infrastructures. </p><p>Chris shares his fascinating journey from spontaneous problem-solving to developing essential security hardware like network taps and data diodes that are now crucial in major industries. </p><p>Discover how Garland Technology collaborates with Velta Technology to tackle common and emerging challenges in network security through innovative solutions. </p><p>Whether you're a tech enthusiast or a professional navigating the intricate world of IT and OT security, this episode offers valuable insights into the foundational strategies that protect your digital landscape from unseen threats. </p><p>Tune in to explore how these tech pioneers are enhancing network security, making the invisible, visible and secure.</p><p>Chapters:</p><ul><li>00:00:00 - Expert Dialogues: Chris Bihary and Craig Duckworth Unpack OT Security</li><li>00:00:59 - Genesis of Garland: Chris's Journey from Idea to Industry</li><li>00:01:45 - Practical Tech: Crafting Solutions for Real-world OT Problems</li><li>00:03:41 - The Visibility Factor: Why Seeing is Securing in Network Safety</li><li>00:05:35 - Sensor Strategy: Optimizing Deployment in Complex Networks</li><li>00:07:22 - Foundations of Security: Building Reliable OT Networks</li><li>00:09:58 - Enhancing Visibility: The Key to Proactive Security Management</li><li>00:13:11 - Overcoming Obstacles: Adapting to Diverse Technological Landscapes</li><li>00:17:56 - Regulatory Impact: How New Standards Shape Security Measures</li><li>00:21:07 - Starting Points: Tactical Advice for Embarking on Security Improvements</li><li>00:24:34 - Leveraging Industry Insights: How to Utilize Market Intelligence for Security Advancements</li><li>00:28:16 - Wrapping Up: Key Takeaways and Forward-Looking Strategies</li></ul><br/><p>Links And Resources:</p><ul><li>Chris Bihary on <a href="https://www.linkedin.com/in/chrisbihary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.garlandtechnology.com/" rel="noopener noreferrer" target="_blank">Garland Technology</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Join your host, CEO and President of Velta Technology, Craig Duckworth and special guest Chris Bihary, CEO and co-founder of Garland Technology, as they discuss the complexities of operational technology (OT) security within critical infrastructures. </p><p>Chris shares his fascinating journey from spontaneous problem-solving to developing essential security hardware like network taps and data diodes that are now crucial in major industries. </p><p>Discover how Garland Technology collaborates with Velta Technology to tackle common and emerging challenges in network security through innovative solutions. </p><p>Whether you're a tech enthusiast or a professional navigating the intricate world of IT and OT security, this episode offers valuable insights into the foundational strategies that protect your digital landscape from unseen threats. </p><p>Tune in to explore how these tech pioneers are enhancing network security, making the invisible, visible and secure.</p><p>Chapters:</p><ul><li>00:00:00 - Expert Dialogues: Chris Bihary and Craig Duckworth Unpack OT Security</li><li>00:00:59 - Genesis of Garland: Chris's Journey from Idea to Industry</li><li>00:01:45 - Practical Tech: Crafting Solutions for Real-world OT Problems</li><li>00:03:41 - The Visibility Factor: Why Seeing is Securing in Network Safety</li><li>00:05:35 - Sensor Strategy: Optimizing Deployment in Complex Networks</li><li>00:07:22 - Foundations of Security: Building Reliable OT Networks</li><li>00:09:58 - Enhancing Visibility: The Key to Proactive Security Management</li><li>00:13:11 - Overcoming Obstacles: Adapting to Diverse Technological Landscapes</li><li>00:17:56 - Regulatory Impact: How New Standards Shape Security Measures</li><li>00:21:07 - Starting Points: Tactical Advice for Embarking on Security Improvements</li><li>00:24:34 - Leveraging Industry Insights: How to Utilize Market Intelligence for Security Advancements</li><li>00:28:16 - Wrapping Up: Key Takeaways and Forward-Looking Strategies</li></ul><br/><p>Links And Resources:</p><ul><li>Chris Bihary on <a href="https://www.linkedin.com/in/chrisbihary/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.garlandtechnology.com/" rel="noopener noreferrer" target="_blank">Garland Technology</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/overcoming-obstacles-in-diverse-technological-landscapes-with-ceo-and-co-founder-of-garland-technology-chris-bihary]]></link><guid isPermaLink="false">bdbb2ac5-1b53-495f-b87c-89a10482f3a7</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 23 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fff9180d-70d8-497c-b08e-0e51e021bccd/Ep-24-Chris-Bihary-Final.mp3" length="56727188" type="audio/mpeg"/><itunes:duration>29:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode></item><item><title>Empowering IT and OT Teams to Improve Industrial Cybersecurity</title><itunes:title>Empowering IT and OT Teams to Improve Industrial Cybersecurity</itunes:title><description><![CDATA[<p>Join Velta Technology’s CTO, Dino Busalachi and COO, Jim Cook, as they delve into the intricate world of IT and OT integration. Explore the challenges and transformative strategies involved in merging these critical technologies within industrial environments. </p><p>Dino and Jim share their expert knowledge and decades of experience, discussing the potential for synergy between operational and information technology to enhance cybersecurity, reduce downtime, and drive company revenue. They liken the integration process to navigating a complex maze where every turn could lead to innovative solutions or unforeseen challenges. </p><p>This episode is a must-listen if you’re looking to understand the future of technology in manufacturing and beyond, promising valuable lessons on collaboration and technological convergence.</p><p>Chapters:</p><ul><li>00:00:00 - Meet the Minds: Dino &amp; Jim’s Take on Bridging Tech Gaps</li><li>00:01:20 - Deep Dive: Contrasting IT &amp; OT Roles and Responsibilities</li><li>00:03:00 - Snapshot: Current Landscape of OT Cybersecurity</li><li>00:06:45 - Bridging the Communication Gap: Techniques and Tools</li><li>00:09:18 - Collaboration Overviews: Building a Unified Tech Framework</li><li>00:10:34 - Synergy Benefits: How Merging IT and OT Strengthens Security</li><li>00:12:47 - Real-time Responses: IT-OT Coordination in Action</li><li>00:16:04 - From Theory to Action: Success Stories in IT-OT Integration</li><li>00:17:05 - Case Study Deep Dive: Effective IT-OT Integration Practices</li><li>00:19:21 - Lessons Learned: Overcoming Obstacles in IT-OT Convergence</li><li>00:21:33 - Harnessing Tech for Operational Efficiency</li><li>00:23:58 - Future-Proofing Industries through IT-OT Synergy</li><li>00:26:09 - Closing Loop: Sustaining Collaboration between IT and OT Teams</li><li>00:28:01 - Final Reflections: Next Steps for IT and OT Integration</li><li>00:29:13 - Parting Wisdom: Empowering IT and OT Teams to Innovate Together</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Join Velta Technology’s CTO, Dino Busalachi and COO, Jim Cook, as they delve into the intricate world of IT and OT integration. Explore the challenges and transformative strategies involved in merging these critical technologies within industrial environments. </p><p>Dino and Jim share their expert knowledge and decades of experience, discussing the potential for synergy between operational and information technology to enhance cybersecurity, reduce downtime, and drive company revenue. They liken the integration process to navigating a complex maze where every turn could lead to innovative solutions or unforeseen challenges. </p><p>This episode is a must-listen if you’re looking to understand the future of technology in manufacturing and beyond, promising valuable lessons on collaboration and technological convergence.</p><p>Chapters:</p><ul><li>00:00:00 - Meet the Minds: Dino &amp; Jim’s Take on Bridging Tech Gaps</li><li>00:01:20 - Deep Dive: Contrasting IT &amp; OT Roles and Responsibilities</li><li>00:03:00 - Snapshot: Current Landscape of OT Cybersecurity</li><li>00:06:45 - Bridging the Communication Gap: Techniques and Tools</li><li>00:09:18 - Collaboration Overviews: Building a Unified Tech Framework</li><li>00:10:34 - Synergy Benefits: How Merging IT and OT Strengthens Security</li><li>00:12:47 - Real-time Responses: IT-OT Coordination in Action</li><li>00:16:04 - From Theory to Action: Success Stories in IT-OT Integration</li><li>00:17:05 - Case Study Deep Dive: Effective IT-OT Integration Practices</li><li>00:19:21 - Lessons Learned: Overcoming Obstacles in IT-OT Convergence</li><li>00:21:33 - Harnessing Tech for Operational Efficiency</li><li>00:23:58 - Future-Proofing Industries through IT-OT Synergy</li><li>00:26:09 - Closing Loop: Sustaining Collaboration between IT and OT Teams</li><li>00:28:01 - Final Reflections: Next Steps for IT and OT Integration</li><li>00:29:13 - Parting Wisdom: Empowering IT and OT Teams to Innovate Together</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/it-vs-ot-industrial-cybersecurity-progress-with-jim-cook-and-dino-busalachi]]></link><guid isPermaLink="false">56355715-2eb4-4ace-8f5f-a6748acf4231</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 16 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/37a5100c-6368-4041-91d9-60ee951e600e/Ep-23-Dino-and-Jim-Final.mp3" length="66300125" type="audio/mpeg"/><itunes:duration>34:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode></item><item><title>The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy</title><itunes:title>The Future of Cybersecurity Insurance with Observatory Holding’s CEO, Gerry Kennedy</itunes:title><description><![CDATA[<p>Gerry Kennedy, CEO of Observatory Strategic Management, alongside Dino Busalachi, co-founder and CTO of Velta Technology, talk about the complex and evolving world of cybersecurity insurance. They unpack the nuances of IT and OT risk management, revealing how past incidents and technological advancements have shaped current practices. </p><p>Their discussion traverses the history from Y2K to present-day cybersecurity challenges, highlighting the crucial role of insurance in mitigating these risks. As they discuss their professional experiences and expert insights, the conversation sheds light on the importance of understanding legal and insurance frameworks in protecting against cyber threats. </p><p>This episode not only demystifies the intricate relationship between technology and insurance but also emphasizes the need for a holistic approach to cybersecurity, making it a must-listen for anyone looking to navigate the digital age safely.</p><p>Chapters:</p><ul><li>00:00:00 - Unveiling the Shadows: The Hidden Dangers Behind Kinetic Events</li><li>00:01:04 - First Impressions: A Blizzard, A Hat, and The Cybersecurity Nexus</li><li>00:02:00 - The Road Less Traveled: From Texting Bans to Cybersecurity Vanguard</li><li>00:04:19 - From Y2K Fears to Today's Cyber Insurance: A Historical Perspective</li><li>00:05:20 - Bridging Worlds: The Indispensable Roles of IT and OT in Securing the Digital Frontier</li><li>00:08:47 - The Cyber Insurance Conundrum: Untangling the Web of IT and OT Risks</li><li>00:13:08 - Beyond the Code: Legal Frameworks Shaping Cybersecurity's Future</li><li>00:17:33 - Looking Ahead: The Interwoven Future of Insurance and Cybersecurity</li><li>00:20:33 - The Underwriter's Lens: Enhancing Insurance with Cybersecurity Insights</li><li>00:23:30 - A Call to Arms: The Imperative of Employee Awareness and OSHA's Emerging Role</li><li>00:25:00 - The Unseen Liability: Navigating the Risks of Digital Premises</li><li>00:28:45 - Fostering Unity: The Power of Community in Bolstering Cyber Resilience</li><li>00:31:50 - The Bedrock of Business: Operational Technology's Critical Role in Cybersecurity</li><li>00:32:28 - On the Horizon: The Evolving Interface of Cybersecurity and Operational</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.linkedin.com/in/gerry-kennedy-42368413/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.observatorystrategicmanagement.com/" rel="noopener noreferrer" target="_blank">Observatory Strategic Management</a> </li><li><a href="https://www.cpomagazine.com/author/gerrykennedy/" rel="noopener noreferrer" target="_blank">CPO Magazine</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Gerry Kennedy, CEO of Observatory Strategic Management, alongside Dino Busalachi, co-founder and CTO of Velta Technology, talk about the complex and evolving world of cybersecurity insurance. They unpack the nuances of IT and OT risk management, revealing how past incidents and technological advancements have shaped current practices. </p><p>Their discussion traverses the history from Y2K to present-day cybersecurity challenges, highlighting the crucial role of insurance in mitigating these risks. As they discuss their professional experiences and expert insights, the conversation sheds light on the importance of understanding legal and insurance frameworks in protecting against cyber threats. </p><p>This episode not only demystifies the intricate relationship between technology and insurance but also emphasizes the need for a holistic approach to cybersecurity, making it a must-listen for anyone looking to navigate the digital age safely.</p><p>Chapters:</p><ul><li>00:00:00 - Unveiling the Shadows: The Hidden Dangers Behind Kinetic Events</li><li>00:01:04 - First Impressions: A Blizzard, A Hat, and The Cybersecurity Nexus</li><li>00:02:00 - The Road Less Traveled: From Texting Bans to Cybersecurity Vanguard</li><li>00:04:19 - From Y2K Fears to Today's Cyber Insurance: A Historical Perspective</li><li>00:05:20 - Bridging Worlds: The Indispensable Roles of IT and OT in Securing the Digital Frontier</li><li>00:08:47 - The Cyber Insurance Conundrum: Untangling the Web of IT and OT Risks</li><li>00:13:08 - Beyond the Code: Legal Frameworks Shaping Cybersecurity's Future</li><li>00:17:33 - Looking Ahead: The Interwoven Future of Insurance and Cybersecurity</li><li>00:20:33 - The Underwriter's Lens: Enhancing Insurance with Cybersecurity Insights</li><li>00:23:30 - A Call to Arms: The Imperative of Employee Awareness and OSHA's Emerging Role</li><li>00:25:00 - The Unseen Liability: Navigating the Risks of Digital Premises</li><li>00:28:45 - Fostering Unity: The Power of Community in Bolstering Cyber Resilience</li><li>00:31:50 - The Bedrock of Business: Operational Technology's Critical Role in Cybersecurity</li><li>00:32:28 - On the Horizon: The Evolving Interface of Cybersecurity and Operational</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.linkedin.com/in/gerry-kennedy-42368413/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.observatorystrategicmanagement.com/" rel="noopener noreferrer" target="_blank">Observatory Strategic Management</a> </li><li><a href="https://www.cpomagazine.com/author/gerrykennedy/" rel="noopener noreferrer" target="_blank">CPO Magazine</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/insurance-and-the-internet-of-things-with-observatorys-ceo-gerry-kennedy]]></link><guid isPermaLink="false">7eb0f179-18d9-4baf-b168-282619673d7d</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 09 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/c167dfad-958a-4057-a515-8c5a3001f9b6/Gerry-Kennedy-Final.mp3" length="76837712" type="audio/mpeg"/><itunes:duration>40:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode></item><item><title>The State of OT Cybersecurity From the Field</title><itunes:title>The State of OT Cybersecurity From the Field</itunes:title><description><![CDATA[<p>Dino Busalachi and Craig Duckworth, leaders and co-founders of Velta Technology, are discussing the paramount importance of safety, quality, and cybersecurity in the operational technology (OT) sector. </p><p>Drawing from their extensive field experience, they illuminate the challenges and solutions in safeguarding industrial environments against cyber threats. Their discussion sheds light on the pervasive issue of underpreparedness in OT cybersecurity, highlighting the critical need for robust defense mechanisms. </p><p>By exploring the intersection of IT and OT cybersecurity strategies, they offer valuable perspectives on building resilient systems that can withstand the evolving landscape of cyber threats. Dino and Craig not only emphasize the urgency of addressing cybersecurity in industrial operations but they’re also giving actionable advice for organizations to fortify defenses and ensure operational continuity.</p><p>Chapters:</p><ul><li>00:00:00 - Navigating the Cybersecurity Terrain in Operational Tech</li><li>00:02:37 - Ownership Dilemmas: Who Holds the Cybersecurity Reins?</li><li>00:04:07 - IT and OT: Collaborating for Stronger Cyber Defenses</li><li>00:05:22 - The Essential Cybersecurity Triad in Action</li><li>00:06:48 - Inside the Cyber Defense Strategy: Real-World Insights</li><li>00:08:15 - The Critical Role of Visibility in Cybersecurity</li><li>00:09:40 - Addressing the Cybersecurity Skills Gap in Industrial Sectors</li><li>00:11:05 - The Evolution of Cyber Threats in Operational Technology</li><li>00:13:50 - Key to Protection: Asset Inventories and Secure Remote Access</li><li>00:21:17 - Lessons from the Field: The Stakes of Cybersecurity Neglect</li><li>00:26:41 - Wrapping Up: Future Directions in OT Cyber Resilience</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi and Craig Duckworth, leaders and co-founders of Velta Technology, are discussing the paramount importance of safety, quality, and cybersecurity in the operational technology (OT) sector. </p><p>Drawing from their extensive field experience, they illuminate the challenges and solutions in safeguarding industrial environments against cyber threats. Their discussion sheds light on the pervasive issue of underpreparedness in OT cybersecurity, highlighting the critical need for robust defense mechanisms. </p><p>By exploring the intersection of IT and OT cybersecurity strategies, they offer valuable perspectives on building resilient systems that can withstand the evolving landscape of cyber threats. Dino and Craig not only emphasize the urgency of addressing cybersecurity in industrial operations but they’re also giving actionable advice for organizations to fortify defenses and ensure operational continuity.</p><p>Chapters:</p><ul><li>00:00:00 - Navigating the Cybersecurity Terrain in Operational Tech</li><li>00:02:37 - Ownership Dilemmas: Who Holds the Cybersecurity Reins?</li><li>00:04:07 - IT and OT: Collaborating for Stronger Cyber Defenses</li><li>00:05:22 - The Essential Cybersecurity Triad in Action</li><li>00:06:48 - Inside the Cyber Defense Strategy: Real-World Insights</li><li>00:08:15 - The Critical Role of Visibility in Cybersecurity</li><li>00:09:40 - Addressing the Cybersecurity Skills Gap in Industrial Sectors</li><li>00:11:05 - The Evolution of Cyber Threats in Operational Technology</li><li>00:13:50 - Key to Protection: Asset Inventories and Secure Remote Access</li><li>00:21:17 - Lessons from the Field: The Stakes of Cybersecurity Neglect</li><li>00:26:41 - Wrapping Up: Future Directions in OT Cyber Resilience</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/the-state-of-ot-cybersecurity-from-the-field]]></link><guid isPermaLink="false">042d66fd-e33f-4eab-8b92-076f32b1ed9c</guid><itunes:image href="https://artwork.captivate.fm/d396e0e9-5d4b-41fe-83a9-110bfffd3e30/YsSigTnuVUfX1a6RX5Gmpg9Y.jpeg"/><pubDate>Tue, 02 Apr 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/a48d9dee-5b03-42c6-a55e-1dfa84b39693/Ep-21-Dino-and-Criag-FInal.mp3" length="55327861" type="audio/mpeg"/><itunes:duration>28:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode></item><item><title>Cybersecurity Missteps Putting the C-Suite at Risk</title><itunes:title>Cybersecurity Missteps Putting the C-Suite at Risk</itunes:title><description><![CDATA[<p>Craig Duckworth and Dino Busalachi CEO and CTO for Velta Technology,  discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. </p><p>Discussing the unique challenges that manufacturing organizations face, they make sure you understand the necessity for executive teams to actively engage in cybersecurity strategies. </p><p>With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency, emphasizing the need for leadership to not only understand but also lead the charge in securing industrial control systems. </p><p>This episode serves as a wake-up call for executives to embrace their pivotal role in protecting their companies from cyber risks, highlighting that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.</p><p>Chapters:</p><ul><li>00:00:00 - Meet the Minds Behind VELTA Technology's Cyber Initiatives</li><li>00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics</li><li>00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity</li><li>00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security</li><li>00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience</li><li>00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders</li><li>00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks</li><li>00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams</li><li>00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA</li><li>00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity</li><li>00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing Sector</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth and Dino Busalachi CEO and CTO for Velta Technology,  discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. </p><p>Discussing the unique challenges that manufacturing organizations face, they make sure you understand the necessity for executive teams to actively engage in cybersecurity strategies. </p><p>With compelling arguments for a more involved C-suite, Craig and Dino explore the intersection of cybersecurity and operational efficiency, emphasizing the need for leadership to not only understand but also lead the charge in securing industrial control systems. </p><p>This episode serves as a wake-up call for executives to embrace their pivotal role in protecting their companies from cyber risks, highlighting that cybersecurity is not just an IT issue but a foundational aspect of modern business resilience.</p><p>Chapters:</p><ul><li>00:00:00 - Meet the Minds Behind VELTA Technology's Cyber Initiatives</li><li>00:01:47 - Deciphering Cybersecurity's Extensive Influence on Manufacturing Dynamics</li><li>00:03:29 - Unpacking the Costs: The Stark Reality of Ignoring Cybersecurity</li><li>00:04:08 - The Interplay Between Cyber Insurance, Liability, and Organizational Security</li><li>00:05:07 - Charting the Course: Fundamental Actions for Cyber Resilience</li><li>00:07:35 - Implementing Cybersecurity Measures: A Tactical Overview for Manufacturing Leaders</li><li>00:10:54 - The Imperative of Continuous Monitoring in Mitigating Cyber Risks</li><li>00:14:11 - Bridging the Divide: Fostering Collaboration Between IT and OT Teams</li><li>00:17:06 - Cultivating Cyber-Aware Culture: Integrating Security into the Manufacturing DNA</li><li>00:20:01 - Forward Momentum: Strategic Insights for Executive Leadership on Cybersecurity</li><li>00:24:28 - Reflecting on the Imperatives of Cybersecurity in the Manufacturing Sector</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/securing-the-factory-floor-a-c-suite-priority]]></link><guid isPermaLink="false">dc98e0bf-534b-4465-b5b3-7a8f407c71c4</guid><itunes:image href="https://artwork.captivate.fm/34d0f7b1-af56-41b6-91e7-1b784dfeaff8/ceu-OGjaVAlkUH7fMLhXYg6h.jpg"/><pubDate>Tue, 26 Mar 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/619ece50-b1a9-430a-9d3e-453afe3a677a/Ep-20-Dino-and-Craig-Final.mp3" length="48945624" type="audio/mpeg"/><itunes:duration>25:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode></item><item><title>S4x24 Insights &amp; Reflections on Cybersecurity Market Trends</title><itunes:title>S4x24 Insights &amp; Reflections on Cybersecurity Market Trends</itunes:title><description><![CDATA[<p>Dino Busalachi and Craig Duckworth share their experiences and takeaways from the recent S4 conference in Miami, shedding light on the evolving landscape of OT cybersecurity. </p><p>They discuss the criticality of IT and OT collaboration in overcoming industrial cybersecurity challenges, underlining key conference takeaways, including the emergence of new technologies, the importance of asset ownership, and the shifting dynamics within the cybersecurity realm. </p><p>Their conversation emphasizes the necessity of understanding and integrating the strengths of both IT and OT to forge a more secure future for industrial environments. Through their dialogue, you’ll gain a comprehensive view of current trends, challenges, and solutions at the intersection of technology and security, inspiring a proactive approach to cybersecurity in the industrial sector.</p><p>Chapters:</p><ul><li>00:00:00 Meet the Hosts: Key Takeaways from S4 in Miami</li><li>00:01:38 A Fresh Perspective on Cybersecurity Conferences</li><li>00:03:17 Highlighting the Role of Asset Owners and Vendor Diversity</li><li>00:04:39 Navigating the OT Cybersecurity Landscape</li><li>00:06:38 Decoding the Investment in OT Cyber Protections</li><li>00:12:46 From Theory to Practice: Case Studies in Action</li><li>00:15:33 On the Horizon: Innovations and Evolving Strategies</li><li>00:23:57 Projecting the Path Forward for OT Security</li><li>00:27:23 Wrapping Up: Anticipations for the Future</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://s4xevents.com/s4x24/" rel="noopener noreferrer" target="_blank">S4 Conference</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi and Craig Duckworth share their experiences and takeaways from the recent S4 conference in Miami, shedding light on the evolving landscape of OT cybersecurity. </p><p>They discuss the criticality of IT and OT collaboration in overcoming industrial cybersecurity challenges, underlining key conference takeaways, including the emergence of new technologies, the importance of asset ownership, and the shifting dynamics within the cybersecurity realm. </p><p>Their conversation emphasizes the necessity of understanding and integrating the strengths of both IT and OT to forge a more secure future for industrial environments. Through their dialogue, you’ll gain a comprehensive view of current trends, challenges, and solutions at the intersection of technology and security, inspiring a proactive approach to cybersecurity in the industrial sector.</p><p>Chapters:</p><ul><li>00:00:00 Meet the Hosts: Key Takeaways from S4 in Miami</li><li>00:01:38 A Fresh Perspective on Cybersecurity Conferences</li><li>00:03:17 Highlighting the Role of Asset Owners and Vendor Diversity</li><li>00:04:39 Navigating the OT Cybersecurity Landscape</li><li>00:06:38 Decoding the Investment in OT Cyber Protections</li><li>00:12:46 From Theory to Practice: Case Studies in Action</li><li>00:15:33 On the Horizon: Innovations and Evolving Strategies</li><li>00:23:57 Projecting the Path Forward for OT Security</li><li>00:27:23 Wrapping Up: Anticipations for the Future</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://s4xevents.com/s4x24/" rel="noopener noreferrer" target="_blank">S4 Conference</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-insights-reflections-from-s4x24]]></link><guid isPermaLink="false">e8ff2bd9-e73e-4b58-ad51-ff8eb99200c6</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 19 Mar 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/b30f160c-ef28-4e77-be24-82a26534f96a/Ep-19-Dino-and-Craig-Final.mp3" length="54460177" type="audio/mpeg"/><itunes:duration>28:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode></item><item><title>Zero Trust in OT: Adapting IT&apos;s Playbook for Enhanced Security</title><itunes:title>Zero Trust in OT: Adapting IT&apos;s Playbook for Enhanced Security</itunes:title><description><![CDATA[<p>Dino Busalachi and Jim Cook, the CTO and COO of VELTA Technology respectively, discuss the intersection between IT (Information Technology) and OT (Operational Technology) in the cybersecurity landscape. They emphasize that, while IT security measures have their value, they cannot be applied as-is to the OT environment due to significant variations in system operations, scale, and impact in case of breaches. </p><p>They stress the importance of holistic consideration of operations when devising cybersecurity measures for OT. They cover topics like zero trust environments, asset inventory, key points from IT’s playbook that may be suited, and ones that would prove challenging in OT – security lessons that need to be adapted rather than employed directly. </p><p>They bring in the element of digital safety being just as important as physical safety in an OT environment considering the potential physical outcomes as a result of breaches. The conversation reveals a need for IT professionals to work in collaboration with their OT counterparts for more effective and robust cybersecurity systems, even as the two roles begin to diverge more explicitly in terms of responsibilities and strategies.</p><p>Chapters:</p><ul><li>00:00:00 - Merging Worlds: The Crucial IT-OT Convergence</li><li>00:02:10 - Zero Trust in OT: Navigating the Transition</li><li>00:10:04 - Asset Management: The Keystone of OT Security</li><li>00:12:50 - The Power of Eyes-On: Continuous Monitoring in OT</li><li>00:14:49 - IT's Supporting Role in Fortifying OT</li><li>00:18:08 - Shifting Gears: OT's Rising Responsibility</li><li>00:20:17 - Building Bridges: Engaging OT in the Cyber Dialogue</li><li>00:21:51 - Remote Access Risks: Navigating OT's Vulnerabilities</li><li>00:24:31 - Counting the Cost: The Impact of Neglecting OT Security</li><li>00:25:21 - Designing with Defense: Security-First Approaches in OT</li><li>00:27:44 - Digital Guardianship: Ensuring Safety in the OT Realm</li><li>00:30:25 - United Front: The Collaborative Role of IT and OT in Security</li><li>00:32:42 - Closing Thoughts: Envisioning the Future of OT Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi and Jim Cook, the CTO and COO of VELTA Technology respectively, discuss the intersection between IT (Information Technology) and OT (Operational Technology) in the cybersecurity landscape. They emphasize that, while IT security measures have their value, they cannot be applied as-is to the OT environment due to significant variations in system operations, scale, and impact in case of breaches. </p><p>They stress the importance of holistic consideration of operations when devising cybersecurity measures for OT. They cover topics like zero trust environments, asset inventory, key points from IT’s playbook that may be suited, and ones that would prove challenging in OT – security lessons that need to be adapted rather than employed directly. </p><p>They bring in the element of digital safety being just as important as physical safety in an OT environment considering the potential physical outcomes as a result of breaches. The conversation reveals a need for IT professionals to work in collaboration with their OT counterparts for more effective and robust cybersecurity systems, even as the two roles begin to diverge more explicitly in terms of responsibilities and strategies.</p><p>Chapters:</p><ul><li>00:00:00 - Merging Worlds: The Crucial IT-OT Convergence</li><li>00:02:10 - Zero Trust in OT: Navigating the Transition</li><li>00:10:04 - Asset Management: The Keystone of OT Security</li><li>00:12:50 - The Power of Eyes-On: Continuous Monitoring in OT</li><li>00:14:49 - IT's Supporting Role in Fortifying OT</li><li>00:18:08 - Shifting Gears: OT's Rising Responsibility</li><li>00:20:17 - Building Bridges: Engaging OT in the Cyber Dialogue</li><li>00:21:51 - Remote Access Risks: Navigating OT's Vulnerabilities</li><li>00:24:31 - Counting the Cost: The Impact of Neglecting OT Security</li><li>00:25:21 - Designing with Defense: Security-First Approaches in OT</li><li>00:27:44 - Digital Guardianship: Ensuring Safety in the OT Realm</li><li>00:30:25 - United Front: The Collaborative Role of IT and OT in Security</li><li>00:32:42 - Closing Thoughts: Envisioning the Future of OT Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/zero-trust-in-ot-adapting-its-playbook-for-enhanced-security]]></link><guid isPermaLink="false">3544a252-437a-4900-bf0a-a09751b119e6</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 27 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/1dd37618-083a-4354-865a-6a4ac9a250b7/IT-Playbook-Final.mp3" length="64925875" type="audio/mpeg"/><itunes:duration>33:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode></item><item><title>Foreign Cybersecurity Threats &amp; Risks to ICS / OT Equipment</title><itunes:title>Foreign Cybersecurity Threats &amp; Risks to ICS / OT Equipment</itunes:title><description><![CDATA[<p>Dino Busalachi and Jim Cook of Velta Technology explore the shadowy realm of cybersecurity threats from foreign adversaries against ICS / Operational Technology (OT) equipment. They discuss the sophisticated methods by which foreign actors, particularly those sponsored by the CCP, use to infiltrate and undermine the very foundations of our society. </p><p>The conversation sheds light on recent government initiatives to root out these digital invaders, revealing a timely and evolving battle against cyber espionage. With expert insights into the challenges of detecting and combating these threats, the episode offers a riveting glimpse into the ongoing efforts to protect national security and the integrity of our critical systems.</p><p>Chapters:</p><ul><li>00:00:00 - Cyber Threats 101: The Challenges of Protecting Critical Infrastructure</li><li>00:01:10 - The Enemy Within: How State-Sponsored Hackers Breach Our Defenses</li><li>00:02:20 - The Cyber Arms Race: How Attack Strategies Keep Evolving</li><li>00:05:18 - The Business Impact: How Cyber Threats Affect the Corporate World</li><li>00:06:44 - The Ripple Effect: How Cyber Attacks Have Wider Implications</li><li>00:12:29 - The Remote Access Risk: How to Secure Vulnerable Entry Points</li><li>00:15:13 - The Government Response: How Federal Initiatives Boost Cybersecurity</li><li>00:18:53 - The Resilience Roadmap: How to Advocate for Better Cybersecurity Measures</li><li>00:23:05 - The Urgent Call: How to Strengthen Digital and National Security</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi and Jim Cook of Velta Technology explore the shadowy realm of cybersecurity threats from foreign adversaries against ICS / Operational Technology (OT) equipment. They discuss the sophisticated methods by which foreign actors, particularly those sponsored by the CCP, use to infiltrate and undermine the very foundations of our society. </p><p>The conversation sheds light on recent government initiatives to root out these digital invaders, revealing a timely and evolving battle against cyber espionage. With expert insights into the challenges of detecting and combating these threats, the episode offers a riveting glimpse into the ongoing efforts to protect national security and the integrity of our critical systems.</p><p>Chapters:</p><ul><li>00:00:00 - Cyber Threats 101: The Challenges of Protecting Critical Infrastructure</li><li>00:01:10 - The Enemy Within: How State-Sponsored Hackers Breach Our Defenses</li><li>00:02:20 - The Cyber Arms Race: How Attack Strategies Keep Evolving</li><li>00:05:18 - The Business Impact: How Cyber Threats Affect the Corporate World</li><li>00:06:44 - The Ripple Effect: How Cyber Attacks Have Wider Implications</li><li>00:12:29 - The Remote Access Risk: How to Secure Vulnerable Entry Points</li><li>00:15:13 - The Government Response: How Federal Initiatives Boost Cybersecurity</li><li>00:18:53 - The Resilience Roadmap: How to Advocate for Better Cybersecurity Measures</li><li>00:23:05 - The Urgent Call: How to Strengthen Digital and National Security</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-risks-of-foreign-access-to-ics-equipment]]></link><guid isPermaLink="false">87871df7-f8d6-497b-abe9-b48596be05b6</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 20 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/3e7702c9-4523-4912-b21e-3bb06ab61ccb/Dino-and-Jim-FInal.mp3" length="54876465" type="audio/mpeg"/><itunes:duration>28:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode></item><item><title>Industrial Cybersecurity Lessons From the Field</title><itunes:title>Industrial Cybersecurity Lessons From the Field</itunes:title><description><![CDATA[<p>Dino Busalachi and Jim Cook, CTO and COO for Velta Technology, invite you on an essential journey into 'Lessons from the Field' of industrial cybersecurity. Their expertise illuminates a landscape where the traditional boundaries between cybersecurity and industrial operations merge, revealing the complexities of protecting manufacturing's vital elements—the industrial control systems. </p><p>They shed light on the unintended consequences of standard information technology (IT) practices on OT environments. Instances like routine scans halting production or unexpected shutdowns due to remote access, are not merely warnings but narratives of resilience, creativity, and the relentless quest for security in the face of cyber threats.</p><p>This episode stands as a rallying cry for those who safeguard industrial cybersecurity, advocating for hands-on, field-based strategies to comprehend and shield the intricate mesh of machinery and technology that drives our industries. </p><p>Highlighting the need for constant alertness, cooperative problem-solving, and a steadfast dedication to a security culture beyond the fluctuating dynamics of staff and protocols, Dino and Jim's dialogue is more than a discussion on challenges—it's a tribute to the unwavering spirit of cybersecurity front-liners. </p><p>Serving as an invaluable guide for cybersecurity professionals, IT and OT managers, and all stakeholders in the digital and physical security sphere, this episode highlights the guardianship required against continuously evolving digital threats.</p><p>Chapters:</p><ul><li>00:00:00 - Meet Our Cyber Guardians: Dino &amp; Jim</li><li>00:01:25 - Field Tactics: Scanning for Cyber Safety</li><li>00:03:17 - Safeguarding with OT IDS: A Closer Look</li><li>00:05:41 - Ignoring Security: A Recipe for Risk</li><li>00:07:38 - Bridging IT and OT: A Unified Front Against Cyber Threats</li><li>00:15:10 - Evolving Cybersecurity: The Path of Continuous Learning</li><li>00:20:13 - Wrapping Up: The Essence of Discovery on the Cyber Frontline</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi and Jim Cook, CTO and COO for Velta Technology, invite you on an essential journey into 'Lessons from the Field' of industrial cybersecurity. Their expertise illuminates a landscape where the traditional boundaries between cybersecurity and industrial operations merge, revealing the complexities of protecting manufacturing's vital elements—the industrial control systems. </p><p>They shed light on the unintended consequences of standard information technology (IT) practices on OT environments. Instances like routine scans halting production or unexpected shutdowns due to remote access, are not merely warnings but narratives of resilience, creativity, and the relentless quest for security in the face of cyber threats.</p><p>This episode stands as a rallying cry for those who safeguard industrial cybersecurity, advocating for hands-on, field-based strategies to comprehend and shield the intricate mesh of machinery and technology that drives our industries. </p><p>Highlighting the need for constant alertness, cooperative problem-solving, and a steadfast dedication to a security culture beyond the fluctuating dynamics of staff and protocols, Dino and Jim's dialogue is more than a discussion on challenges—it's a tribute to the unwavering spirit of cybersecurity front-liners. </p><p>Serving as an invaluable guide for cybersecurity professionals, IT and OT managers, and all stakeholders in the digital and physical security sphere, this episode highlights the guardianship required against continuously evolving digital threats.</p><p>Chapters:</p><ul><li>00:00:00 - Meet Our Cyber Guardians: Dino &amp; Jim</li><li>00:01:25 - Field Tactics: Scanning for Cyber Safety</li><li>00:03:17 - Safeguarding with OT IDS: A Closer Look</li><li>00:05:41 - Ignoring Security: A Recipe for Risk</li><li>00:07:38 - Bridging IT and OT: A Unified Front Against Cyber Threats</li><li>00:15:10 - Evolving Cybersecurity: The Path of Continuous Learning</li><li>00:20:13 - Wrapping Up: The Essence of Discovery on the Cyber Frontline</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-lessons-from-the-field]]></link><guid isPermaLink="false">9ea5d545-a1b1-4dcd-817b-d44668224b2b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 13 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8883fefe-22dc-4e67-84e2-759bd1910e3a/Ep-16-Lessons-Final.mp3" length="42595988" type="audio/mpeg"/><itunes:duration>22:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode></item><item><title>Asset Inventory and Management the IT versus the OT Way</title><itunes:title>Asset Inventory and Management the IT versus the OT Way</itunes:title><description><![CDATA[<p>How do you balance the needs of information technology (IT) and operational technology (OT), two domains that are often at odds with each other with priorities and protocols? How do you ensure the security, efficiency and safety of both the digital and the physical aspects of your operations? </p><p>In this episode, Dino Busalachi and Jim Cook take us on a deep dive into the complex worlds of asset and inventory management within both IT and OT, two crucial parts of a manufacturing or critical infrastructure organization. Drawing from their extensive experience, they reveal the unique challenges and methodologies of each domain. </p><p>They discuss the common lack of understanding around operational technology equipment, and the safety and performance implications of asset and inventory management for the industrial plant floor.</p><p>Whether you are an IT or OT professional, a business leader, or a curious listener, this episode will enlighten you on the dynamics of IT and OT, and inspire you to adopt a holistic and collaborative approach to asset inventories and management. Listen and learn how IT and OT can work together to create a more secure and efficient world.</p><p>Chapters:</p><ul><li>00:00:00 - Unpacking IT vs. OT Asset Inventories</li><li>00:01:10 - The Crucial Role of Asset Inventories in Security</li><li>00:04:50 - Manufacturing Challenges: Inventory Management Insights</li><li>00:07:55 - Visual Inspections' Role in OT Inventory Checks</li><li>00:08:46 - Solving OT Network Connectivity Issues</li><li>00:11:30 - Implementing Passive Intrusion Detection in OT</li><li>00:14:56 - Addressing OT Network Sensitivity Challenges</li><li>00:16:18 - Lockout Tag Use in Operational Safety</li><li>00:17:50 - Leveraging Deep Packet Inspection for OT Security</li><li>00:22:06 - Integrating IT Strategies into OT Security</li><li>00:26:51 - OT's Impact on Minimizing Downtime</li><li>00:30:44 - Initiating OT Security Measures</li><li>00:33:14 - Highlighting the Risks in Neglecting OT Security</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>How do you balance the needs of information technology (IT) and operational technology (OT), two domains that are often at odds with each other with priorities and protocols? How do you ensure the security, efficiency and safety of both the digital and the physical aspects of your operations? </p><p>In this episode, Dino Busalachi and Jim Cook take us on a deep dive into the complex worlds of asset and inventory management within both IT and OT, two crucial parts of a manufacturing or critical infrastructure organization. Drawing from their extensive experience, they reveal the unique challenges and methodologies of each domain. </p><p>They discuss the common lack of understanding around operational technology equipment, and the safety and performance implications of asset and inventory management for the industrial plant floor.</p><p>Whether you are an IT or OT professional, a business leader, or a curious listener, this episode will enlighten you on the dynamics of IT and OT, and inspire you to adopt a holistic and collaborative approach to asset inventories and management. Listen and learn how IT and OT can work together to create a more secure and efficient world.</p><p>Chapters:</p><ul><li>00:00:00 - Unpacking IT vs. OT Asset Inventories</li><li>00:01:10 - The Crucial Role of Asset Inventories in Security</li><li>00:04:50 - Manufacturing Challenges: Inventory Management Insights</li><li>00:07:55 - Visual Inspections' Role in OT Inventory Checks</li><li>00:08:46 - Solving OT Network Connectivity Issues</li><li>00:11:30 - Implementing Passive Intrusion Detection in OT</li><li>00:14:56 - Addressing OT Network Sensitivity Challenges</li><li>00:16:18 - Lockout Tag Use in Operational Safety</li><li>00:17:50 - Leveraging Deep Packet Inspection for OT Security</li><li>00:22:06 - Integrating IT Strategies into OT Security</li><li>00:26:51 - OT's Impact on Minimizing Downtime</li><li>00:30:44 - Initiating OT Security Measures</li><li>00:33:14 - Highlighting the Risks in Neglecting OT Security</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/how-to-manage-the-digital-and-the-physical-in-asset-management]]></link><guid isPermaLink="false">96a1805d-1aa6-4129-bba7-d1583572f188</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 06 Feb 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/29da4797-94e9-4727-bbfd-49bf8cbe92ca/Asset-Inventories-Final.mp3" length="66012569" type="audio/mpeg"/><itunes:duration>34:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode></item><item><title>Cybersecurity and Data Protection in Modern Manufacturing with Jim Fledderjohn, Dell Technologies</title><itunes:title>Cybersecurity and Data Protection in Modern Manufacturing with Jim Fledderjohn, Dell Technologies</itunes:title><description><![CDATA[<p>Jim Fledderjohn, a seasoned Manufacturing Field Director at Dell, takes us on a deep dive into the intricate world where operational technology (OT) meets information technology (IT), discussing the complexities and innovations reshaping today's manufacturing landscape. </p><p>He sheds light on Dell's strategic endeavors in fortifying industrial cybersecurity, emphasizing the pivotal role of digital safety in this era of technological revolution. From Dell Validated Designs to the importance of company culture and ownership of technology on the plant floor, and dynamics between IT and OT. </p><p>This episode is not just a conversation; it's a journey into understanding how the meticulous integration of data integrity and advanced technology is not just enhancing, but revolutionizing the manufacturing industry. Join us for an enlightening exploration of the future, as envisioned by one of Dell's leading minds.</p><p>Chapters:</p><ul><li>00:00:00 - Intro: Welcoming Jim Fledderjohn &amp; Topic Overview</li><li>00:00:59 - Dell's Manufacturing Insights: Bridging IT &amp; OT</li><li>00:02:40 - Tackling IT-OT Integration Challenges</li><li>00:03:52 - Enhancing IT-OT Collaboration &amp; Transparency</li><li>00:06:39 - Dell's Pivotal Role in Industrial Cybersecurity</li><li>00:09:09 - Digital Safety's Critical Role in IT &amp; OT</li><li>00:13:08 - Cybersecurity's Influence on Corporate Reputation</li><li>00:15:56 - Emphasizing Continuous Monitoring in Operational Technology</li><li>00:22:43 - Leveraging Third-Party Expertise in OT Environments</li><li>00:26:09 - Wrapping Up: Key Takeaways &amp; Concluding Thoughts</li></ul><br/><p>Links And Resources:</p><ul><li>Jim Fledderjohn on <a href="https://www.linkedin.com/in/jim-fledderjohn-stlouis/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Jim Fledderjohn, a seasoned Manufacturing Field Director at Dell, takes us on a deep dive into the intricate world where operational technology (OT) meets information technology (IT), discussing the complexities and innovations reshaping today's manufacturing landscape. </p><p>He sheds light on Dell's strategic endeavors in fortifying industrial cybersecurity, emphasizing the pivotal role of digital safety in this era of technological revolution. From Dell Validated Designs to the importance of company culture and ownership of technology on the plant floor, and dynamics between IT and OT. </p><p>This episode is not just a conversation; it's a journey into understanding how the meticulous integration of data integrity and advanced technology is not just enhancing, but revolutionizing the manufacturing industry. Join us for an enlightening exploration of the future, as envisioned by one of Dell's leading minds.</p><p>Chapters:</p><ul><li>00:00:00 - Intro: Welcoming Jim Fledderjohn &amp; Topic Overview</li><li>00:00:59 - Dell's Manufacturing Insights: Bridging IT &amp; OT</li><li>00:02:40 - Tackling IT-OT Integration Challenges</li><li>00:03:52 - Enhancing IT-OT Collaboration &amp; Transparency</li><li>00:06:39 - Dell's Pivotal Role in Industrial Cybersecurity</li><li>00:09:09 - Digital Safety's Critical Role in IT &amp; OT</li><li>00:13:08 - Cybersecurity's Influence on Corporate Reputation</li><li>00:15:56 - Emphasizing Continuous Monitoring in Operational Technology</li><li>00:22:43 - Leveraging Third-Party Expertise in OT Environments</li><li>00:26:09 - Wrapping Up: Key Takeaways &amp; Concluding Thoughts</li></ul><br/><p>Links And Resources:</p><ul><li>Jim Fledderjohn on <a href="https://www.linkedin.com/in/jim-fledderjohn-stlouis/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-and-data-protection-in-modern-manufacturing-with-jim-fledderjohn]]></link><guid isPermaLink="false">fce9d9c8-a113-4781-9f18-05efdb24f4be</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 30 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dee3a940-5099-42e3-86bf-e58529b24ca3/Jim-Fledderjohn-Final.mp3" length="54750241" type="audio/mpeg"/><itunes:duration>28:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode></item><item><title>Future Trends &amp; Evolving Cybersecurity Threats with Simon Chassar, Claroty Former CRO</title><itunes:title>Future Trends &amp; Evolving Cybersecurity Threats with Simon Chassar, Claroty Former CRO</itunes:title><description><![CDATA[<p>Today we welcome Simon Chassar, former CRO of Claroty, to the show. Simon and Craig Duckworth explore the ever-evolving cyber threats facing the industrial sector, underscoring the critical need for robust operational technology (OT) security. Simon highlights the unique challenges posed by legacy systems, their adaptation to modern security standards, and the necessity of industry-specific cybersecurity measures. </p><p>The conversation shifts to the role of regulation in driving security initiatives and the dire need for skilled professionals in this specialized field. They discuss the complexities of securing industrial control systems and emphasize the imperative of protecting society's critical infrastructure. </p><p>This episode is not just a discussion; it's a deep dive into the intricacies of industrial cybersecurity, blending expert insights with real-world implications, making it a must-listen for anyone concerned with the intersection of technology, security, and industrial resilience.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Simon Chassar and Cybersecurity in Industry</li><li>00:00:52 - Evolving Challenges in Industrial Cybersecurity</li><li>00:02:18 - Analyzing the Impact of Cyber Threats in Industrial Settings</li><li>00:05:28 - Critical Role of Cybersecurity in the Manufacturing Sector</li><li>00:07:06 - Anticipating the Future Trends in Industrial Cybersecurity</li><li>00:09:40 - Government's Influence and Regulatory Aspects in Cyber Protection</li><li>00:12:29 - Addressing the Cybersecurity Skills Gap and Education</li><li>00:13:44 - Emphasizing 'Secure by Design' in Digital Industrial Transformation</li><li>00:26:29 - Collaborative Approaches and Responsibility in Cybersecurity Initiatives</li><li>00:27:17 - Wrapping Up: Key Takeaways and Simon Chassar’s Final Insights</li></ul><br/><p>Links And Resources:</p><ul><li>Simon Chassar on <a href="https://www.linkedin.com/in/schassar" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://claroty.com" rel="noopener noreferrer" target="_blank">Claroty</a></li><li>Simon on <a href="https://twitter.com/CyberChassar" rel="noopener noreferrer" target="_blank">Twitter</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Today we welcome Simon Chassar, former CRO of Claroty, to the show. Simon and Craig Duckworth explore the ever-evolving cyber threats facing the industrial sector, underscoring the critical need for robust operational technology (OT) security. Simon highlights the unique challenges posed by legacy systems, their adaptation to modern security standards, and the necessity of industry-specific cybersecurity measures. </p><p>The conversation shifts to the role of regulation in driving security initiatives and the dire need for skilled professionals in this specialized field. They discuss the complexities of securing industrial control systems and emphasize the imperative of protecting society's critical infrastructure. </p><p>This episode is not just a discussion; it's a deep dive into the intricacies of industrial cybersecurity, blending expert insights with real-world implications, making it a must-listen for anyone concerned with the intersection of technology, security, and industrial resilience.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to Simon Chassar and Cybersecurity in Industry</li><li>00:00:52 - Evolving Challenges in Industrial Cybersecurity</li><li>00:02:18 - Analyzing the Impact of Cyber Threats in Industrial Settings</li><li>00:05:28 - Critical Role of Cybersecurity in the Manufacturing Sector</li><li>00:07:06 - Anticipating the Future Trends in Industrial Cybersecurity</li><li>00:09:40 - Government's Influence and Regulatory Aspects in Cyber Protection</li><li>00:12:29 - Addressing the Cybersecurity Skills Gap and Education</li><li>00:13:44 - Emphasizing 'Secure by Design' in Digital Industrial Transformation</li><li>00:26:29 - Collaborative Approaches and Responsibility in Cybersecurity Initiatives</li><li>00:27:17 - Wrapping Up: Key Takeaways and Simon Chassar’s Final Insights</li></ul><br/><p>Links And Resources:</p><ul><li>Simon Chassar on <a href="https://www.linkedin.com/in/schassar" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://claroty.com" rel="noopener noreferrer" target="_blank">Claroty</a></li><li>Simon on <a href="https://twitter.com/CyberChassar" rel="noopener noreferrer" target="_blank">Twitter</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/from-the-server-room-to-the-factory-floor-industrial-cybersecurity-threats-with-simon-chasser-claroty-former-cro]]></link><guid isPermaLink="false">de20ba16-54ba-474f-a155-f37d427ec61b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 23 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/85b72e1a-3707-408b-9e52-3e3c534098b4/Simon-Chasser-Final.mp3" length="54388288" type="audio/mpeg"/><itunes:duration>28:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode></item><item><title>Operational Technology: A Case Study on Securing the Backbone of Manufacturing</title><itunes:title>Operational Technology: A Case Study on Securing the Backbone of Manufacturing</itunes:title><description><![CDATA[<p>Dino and Jim examine a case study from a Velta Technology client, showcasing the importance of continuous monitoring in industrial control systems (ICS). They highlight how proactive cybersecurity can prevent significant breaches, stressing the link between cyber and physical safety in industrial settings. They share insights on integrating IT and OT for stronger security and shed light on internal threats in manufacturing. </p><p>This concise yet comprehensive episode is crucial for anyone in cybersecurity, IT and OT management, industrial engineering, or manufacturing leadership. It provides practical yet key understandings of cybersecurity's role in protecting industrial operations.</p><p>Chapters:</p><ul><li>00:00:00 - Opening Remarks: Introducing the Episode's Focus on OT Cybersecurity and Velta Technology</li><li>00:00:49 - Monitoring Industrial Systems: Exploring Why Vigilance in OT is Critical</li><li>00:01:28 - Velta Technology's Cybersecurity Success: A Deep Dive into Their Case Study</li><li>00:02:08 - The Role of Continuous Monitoring: Discussing Essential Tools and Strategies</li><li>00:06:43 - Combating Phishing and Embracing MFA: Practical Advice for Industrial Cybersecurity</li><li>00:08:23 - Responding to Breaches: The Impact on Businesses and the Value of Swift Action</li><li>00:16:35 - Cybersecurity ROI: Protecting Organizational Value and Investment Paybacks</li><li>00:20:39 - Due Diligence in Cybersecurity: Risks and Responsibilities in the OT Space</li><li>00:23:23 - Wrap-Up: Concluding Thoughts on OT Cybersecurity and Future Directions</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino and Jim examine a case study from a Velta Technology client, showcasing the importance of continuous monitoring in industrial control systems (ICS). They highlight how proactive cybersecurity can prevent significant breaches, stressing the link between cyber and physical safety in industrial settings. They share insights on integrating IT and OT for stronger security and shed light on internal threats in manufacturing. </p><p>This concise yet comprehensive episode is crucial for anyone in cybersecurity, IT and OT management, industrial engineering, or manufacturing leadership. It provides practical yet key understandings of cybersecurity's role in protecting industrial operations.</p><p>Chapters:</p><ul><li>00:00:00 - Opening Remarks: Introducing the Episode's Focus on OT Cybersecurity and Velta Technology</li><li>00:00:49 - Monitoring Industrial Systems: Exploring Why Vigilance in OT is Critical</li><li>00:01:28 - Velta Technology's Cybersecurity Success: A Deep Dive into Their Case Study</li><li>00:02:08 - The Role of Continuous Monitoring: Discussing Essential Tools and Strategies</li><li>00:06:43 - Combating Phishing and Embracing MFA: Practical Advice for Industrial Cybersecurity</li><li>00:08:23 - Responding to Breaches: The Impact on Businesses and the Value of Swift Action</li><li>00:16:35 - Cybersecurity ROI: Protecting Organizational Value and Investment Paybacks</li><li>00:20:39 - Due Diligence in Cybersecurity: Risks and Responsibilities in the OT Space</li><li>00:23:23 - Wrap-Up: Concluding Thoughts on OT Cybersecurity and Future Directions</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/operational-technology-a-case-study-on-securing-the-backbone-of-manufacturing]]></link><guid isPermaLink="false">f117e1f9-74c4-4779-b077-133f176ffad5</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 16 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/9e380ccd-0615-4040-986e-1e594e0b57d0/Jim-and-Dino-Final.mp3" length="47005457" type="audio/mpeg"/><itunes:duration>24:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode></item><item><title>Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady</title><itunes:title>Cybersecurity A-Z in Manufacturing and Industrial Sectors with Armis CTO, Mick Coady</itunes:title><description><![CDATA[<p>Dino Busalachi has a fascinating conversation with Mick Coady, CTO of Armis, exploring the intricate world of operational technology (OT) and cybersecurity. </p><p>Mick shares his extensive experience, from his early days in the field to his current role at Armis, offering valuable insights into the challenges and opportunities in OT cybersecurity. </p><p>He discusses the importance of IT-OT convergence, the role of technology in operational efficiency, and the evolving landscape of cybersecurity in critical infrastructures. He shares insights on the complexities of OT and how cybersecurity strategies are being shaped in this rapidly evolving field.</p><p>Chapters:</p><ul><li>00:00:00 - Mick Coady's Introduction: Discover Mick's role as CTO of Armis and his professional background</li><li>00:00:56 - Entering the Cybersecurity World: Explore Mick's journey into the field of cybersecurity.</li><li>00:03:14 - OT Challenges in Manufacturing: Insights into unique cybersecurity challenges faced by manufacturing organizations</li><li>00:05:36 - Bridging IT and OT: Discussion on the convergence of Information Technology and Operational Technology</li><li>00:08:57 - OEM's Influence in OT: Examining the role of Original Equipment Manufacturers in the OT landscape</li><li>00:12:12 - Cybersecurity Partnerships: The critical role of partnerships in enhancing cybersecurity measures</li><li>00:23:40 - Navigating Cybersecurity Regulations: Insights into the regulatory aspects of cybersecurity</li><li>00:26:59 - Wrapping Up: Conclusion of the conversation with Mick Coady and closing remarks</li></ul><br/><p>Links And Resources:</p><ul><li>Mick Coady on <a href="https://www.linkedin.com/in/mick-coady-1202701/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.armis.com/" rel="noopener noreferrer" target="_blank">Armis</a></li><li>Mick Coady on <a href="https://twitter.com/Mick_Coady" rel="noopener noreferrer" target="_blank">Twitter</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi has a fascinating conversation with Mick Coady, CTO of Armis, exploring the intricate world of operational technology (OT) and cybersecurity. </p><p>Mick shares his extensive experience, from his early days in the field to his current role at Armis, offering valuable insights into the challenges and opportunities in OT cybersecurity. </p><p>He discusses the importance of IT-OT convergence, the role of technology in operational efficiency, and the evolving landscape of cybersecurity in critical infrastructures. He shares insights on the complexities of OT and how cybersecurity strategies are being shaped in this rapidly evolving field.</p><p>Chapters:</p><ul><li>00:00:00 - Mick Coady's Introduction: Discover Mick's role as CTO of Armis and his professional background</li><li>00:00:56 - Entering the Cybersecurity World: Explore Mick's journey into the field of cybersecurity.</li><li>00:03:14 - OT Challenges in Manufacturing: Insights into unique cybersecurity challenges faced by manufacturing organizations</li><li>00:05:36 - Bridging IT and OT: Discussion on the convergence of Information Technology and Operational Technology</li><li>00:08:57 - OEM's Influence in OT: Examining the role of Original Equipment Manufacturers in the OT landscape</li><li>00:12:12 - Cybersecurity Partnerships: The critical role of partnerships in enhancing cybersecurity measures</li><li>00:23:40 - Navigating Cybersecurity Regulations: Insights into the regulatory aspects of cybersecurity</li><li>00:26:59 - Wrapping Up: Conclusion of the conversation with Mick Coady and closing remarks</li></ul><br/><p>Links And Resources:</p><ul><li>Mick Coady on <a href="https://www.linkedin.com/in/mick-coady-1202701/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.armis.com/" rel="noopener noreferrer" target="_blank">Armis</a></li><li>Mick Coady on <a href="https://twitter.com/Mick_Coady" rel="noopener noreferrer" target="_blank">Twitter</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on <a href="https://open.spotify.com/show/6y0fvWaYstCG604LYveckc" rel="noopener noreferrer" target="_blank">Spotify</a>, <a href="https://podcasts.apple.com/us/podcast/industrial-cybersecurity-insider/id1713811546" rel="noopener noreferrer" target="_blank">Apple Podcasts</a>, <a href="https://www.youtube.com/@veltatechnology" rel="noopener noreferrer" target="_blank">YouTube</a>, and <a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5jYXB0aXZhdGUuZm0vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5LWluc2lkZXIv?sa=X&amp;ved=0CAMQ4aUDahcKEwjg09K9rdmDAxUAAAAAHQAAAAAQAQ" rel="noopener noreferrer" target="_blank">Google Podcasts</a> to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-in-manufacturing-and-industrial-sectors-with-armis-cto-mick-coady]]></link><guid isPermaLink="false">a0be7d9d-3131-477c-aee9-2677143cf77b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 09 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/5a7371f4-335f-4a5a-85d2-32fb3efcda4a/Mick-Coady-Final.mp3" length="53860824" type="audio/mpeg"/><itunes:duration>28:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode></item><item><title>Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon</title><itunes:title>Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon</itunes:title><description><![CDATA[<p>We sit down with Debbie Gordon, the CEO of Cloud Range Cyber, to explore the groundbreaking world of cybersecurity training for ICS and the Operational Technology frontlines. Debbie shares her expertise on how virtualized training environments are transforming the way cybersecurity teams prepare for and respond to cyber attacks. We get into the significance of experiential learning in cybersecurity, discuss the challenges of talent shortages and the necessity for continuous, hands-on training. Listeners will gain a comprehensive understanding of how Cloud Range’s innovative approach is equipping cyber defense teams to face the ever-evolving landscape of cyber threats.</p><p>Chapters:</p><ul><li>00:00:00 - Introducing Debbie Gordon: CEO of Cloud Range Cyber</li><li>00:00:59 - Exploring Cloud Range: A Revolutionary Virtual Cyber Range Platform</li><li>00:02:11 - The Critical Role of Simulated Cybersecurity Exercises</li><li>00:03:27 - Adapting to the Evolving Cybersecurity Threat Landscape</li><li>00:05:48 - The Genesis of Cloud Range: Innovating Cyber Training</li><li>00:08:11 - Addressing the Cybersecurity Skills Gap: Challenges and Solutions</li><li>00:11:23 - Customizing Training with Cloud Range for Effective Talent Development</li><li>00:16:02 - Harnessing Creativity and Analytical Skills in Cyber Defense</li><li>00:21:06 - Cybersecurity in the Post-COVID Era: New Challenges and Approaches</li><li>00:27:28 - Key Strategies for Organizations Embarking on Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Debbie Gordon on <a href="https://www.linkedin.com/in/degordon" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.cloudrangecyber.com/" rel="noopener noreferrer" target="_blank">Cloud Range Cyber</a></li><li>Debbie Gordon on <a href="https://twitter.com/debbiegordon" rel="noopener noreferrer" target="_blank">Twitter</a></li><li><a href="https://www.facebook.com/CloudRangeCyber/" rel="noopener noreferrer" target="_blank">Cloud Range Cyber on Facebook</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>We sit down with Debbie Gordon, the CEO of Cloud Range Cyber, to explore the groundbreaking world of cybersecurity training for ICS and the Operational Technology frontlines. Debbie shares her expertise on how virtualized training environments are transforming the way cybersecurity teams prepare for and respond to cyber attacks. We get into the significance of experiential learning in cybersecurity, discuss the challenges of talent shortages and the necessity for continuous, hands-on training. Listeners will gain a comprehensive understanding of how Cloud Range’s innovative approach is equipping cyber defense teams to face the ever-evolving landscape of cyber threats.</p><p>Chapters:</p><ul><li>00:00:00 - Introducing Debbie Gordon: CEO of Cloud Range Cyber</li><li>00:00:59 - Exploring Cloud Range: A Revolutionary Virtual Cyber Range Platform</li><li>00:02:11 - The Critical Role of Simulated Cybersecurity Exercises</li><li>00:03:27 - Adapting to the Evolving Cybersecurity Threat Landscape</li><li>00:05:48 - The Genesis of Cloud Range: Innovating Cyber Training</li><li>00:08:11 - Addressing the Cybersecurity Skills Gap: Challenges and Solutions</li><li>00:11:23 - Customizing Training with Cloud Range for Effective Talent Development</li><li>00:16:02 - Harnessing Creativity and Analytical Skills in Cyber Defense</li><li>00:21:06 - Cybersecurity in the Post-COVID Era: New Challenges and Approaches</li><li>00:27:28 - Key Strategies for Organizations Embarking on Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li>Debbie Gordon on <a href="https://www.linkedin.com/in/degordon" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.cloudrangecyber.com/" rel="noopener noreferrer" target="_blank">Cloud Range Cyber</a></li><li>Debbie Gordon on <a href="https://twitter.com/debbiegordon" rel="noopener noreferrer" target="_blank">Twitter</a></li><li><a href="https://www.facebook.com/CloudRangeCyber/" rel="noopener noreferrer" target="_blank">Cloud Range Cyber on Facebook</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/powering-up-cyber-defense-teams-with-training-and-technology-with-debbie-gordon-cloud-range-cyber-ceo]]></link><guid isPermaLink="false">c767e634-c29a-4f17-9167-45f98da69cb1</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 02 Jan 2024 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/e6154642-a088-4004-86dc-0fdd24b10b04/Debbie-Gordon-Final.mp3" length="58079704" type="audio/mpeg"/><itunes:duration>30:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode></item><item><title>High Visibility Cyber Attacks from MGM to Clorox to Critical Infrastructure: Risks and Responses</title><itunes:title>High Visibility Cyber Attacks from MGM to Clorox to Critical Infrastructure: Risks and Responses</itunes:title><description><![CDATA[<p>Join us for an insightful conversation with Dino Busalachi, CTO; and Craig Duckworth,  President and CEO, of Velta Technology. They also share their perspectives on some of the recent cyber attacks that have shaken the OT space, such as the Oldsmar water plant, the Colonial Pipeline, and the MGM casino. Dino and Craig reveal how they help various industrial sectors, from manufacturing to gaming, protect their operational technology systems from cyber threats. </p><p>They explain how IT and OT cybersecurity differ and overlap, and how to foster a collaborative and effective approach. They also highlight the key elements of a robust OT cybersecurity strategy, such as a defensible architecture, a continuous monitoring system, a vulnerability management program, a secure remote access tool, and an incident response plan. They also share some of the best practices, common pitfalls, and future trends in the OT cybersecurity field.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to the Industrial Cybersecurity Insider Podcast</li><li>00:01:11 - How Hackers Tried to Poison a Florida City’s Water Supply</li><li>00:02:57 - The Unique Challenges and Opportunities of OT Cybersecurity in Manufacturing</li><li>00:04:15 - How to Secure Remote Access to Your Industrial Systems</li><li>00:06:37 - How a Ransomware Attack Shut Down a Major US Pipeline</li><li>00:07:20 - Why You Need to Monitor Your OT Network and Assets</li><li>00:09:49 - How to Bridge the Gap Between IT and OT Teams</li><li>00:20:12 - How Cyber Attacks Can Affect the Casino Business and Customers</li><li>00:23:12 - How Cybersecurity Insurance and Legal Issues Can Impact Your OT Strategy</li><li>00:26:35 - Key Takeaways and Tips from VELTA Technology Experts</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Join us for an insightful conversation with Dino Busalachi, CTO; and Craig Duckworth,  President and CEO, of Velta Technology. They also share their perspectives on some of the recent cyber attacks that have shaken the OT space, such as the Oldsmar water plant, the Colonial Pipeline, and the MGM casino. Dino and Craig reveal how they help various industrial sectors, from manufacturing to gaming, protect their operational technology systems from cyber threats. </p><p>They explain how IT and OT cybersecurity differ and overlap, and how to foster a collaborative and effective approach. They also highlight the key elements of a robust OT cybersecurity strategy, such as a defensible architecture, a continuous monitoring system, a vulnerability management program, a secure remote access tool, and an incident response plan. They also share some of the best practices, common pitfalls, and future trends in the OT cybersecurity field.</p><p>Chapters:</p><ul><li>00:00:00 - Welcome to the Industrial Cybersecurity Insider Podcast</li><li>00:01:11 - How Hackers Tried to Poison a Florida City’s Water Supply</li><li>00:02:57 - The Unique Challenges and Opportunities of OT Cybersecurity in Manufacturing</li><li>00:04:15 - How to Secure Remote Access to Your Industrial Systems</li><li>00:06:37 - How a Ransomware Attack Shut Down a Major US Pipeline</li><li>00:07:20 - Why You Need to Monitor Your OT Network and Assets</li><li>00:09:49 - How to Bridge the Gap Between IT and OT Teams</li><li>00:20:12 - How Cyber Attacks Can Affect the Casino Business and Customers</li><li>00:23:12 - How Cybersecurity Insurance and Legal Issues Can Impact Your OT Strategy</li><li>00:26:35 - Key Takeaways and Tips from VELTA Technology Experts</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cyber-attack-on-the-casino-floor-risks-and-responses]]></link><guid isPermaLink="false">a271dbd7-d4b4-4b8f-9bb7-38147e2f568b</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 26 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/7fc1b426-c1c4-4dc6-902c-a44ba31e0009/MGM-and-Cyber-Ready-for-CE-and-YT.mp3" length="56748922" type="audio/mpeg"/><itunes:duration>29:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode></item><item><title>Innovation, Regulation and Education in ICS Cybersecurity with Nozomi’s Danielle Jablanski</title><itunes:title>Innovation, Regulation and Education in ICS Cybersecurity with Nozomi’s Danielle Jablanski</itunes:title><description><![CDATA[<p>In this week's episode, Danielle Jablanski, an OT cybersecurity strategist at Nozomi Networks, discusses the current and future landscape of OT cybersecurity with Velta Technology's CTO, Dino Busalachi. Danielle shares her unique perspective as a former market analyst, a current educator, and a passionate advocate for OT security. She discusses the cultural and technical challenges of bridging the IT/OT divide, the impact of regulation and liability on OT security, the importance of building strong foundations and defensible architectures, and the need for workforce enablement and development. She also gives us some practical tips and resources on how to learn more about OT cybersecurity and how to apply it in different contexts and scenarios.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction and Overview with Danielle Jablanski</li><li>00:00:56 - Defining the Role of an OT Cybersecurity Strategist</li><li>00:01:54 - IT and OT: Collaboration and Challenges</li><li>00:03:28 - Professional Services in IT-OT Integration</li><li>00:05:37 - Contextualizing Security in the OT Environment</li><li>00:08:08 - Executive Leadership in OT Security Implementation</li><li>00:13:01 - Enhancing OT Security Through Workforce Development</li><li>00:17:21 - Future Outlook on OT Cybersecurity Trends</li><li>00:21:07 - Educational Resources for Advancing in OT Security</li><li>00:24:03 - Key Takeaways and Practical Tips in OT Security</li></ul><br/><p>Links And Resources:</p><ul><li>Danielle Jablanski(DJ) on <a href="https://www.linkedin.com/in/daniellejjablanski" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></li><li><a href="https://www.atlanticcouncil.org/expert/danielle-jablanski/" rel="noopener noreferrer" target="_blank">Atlantic Council</a></li><li><a href="https://industrialcyber.co/author/daniellej/" rel="noopener noreferrer" target="_blank">Industrial Cyber</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>In this week's episode, Danielle Jablanski, an OT cybersecurity strategist at Nozomi Networks, discusses the current and future landscape of OT cybersecurity with Velta Technology's CTO, Dino Busalachi. Danielle shares her unique perspective as a former market analyst, a current educator, and a passionate advocate for OT security. She discusses the cultural and technical challenges of bridging the IT/OT divide, the impact of regulation and liability on OT security, the importance of building strong foundations and defensible architectures, and the need for workforce enablement and development. She also gives us some practical tips and resources on how to learn more about OT cybersecurity and how to apply it in different contexts and scenarios.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction and Overview with Danielle Jablanski</li><li>00:00:56 - Defining the Role of an OT Cybersecurity Strategist</li><li>00:01:54 - IT and OT: Collaboration and Challenges</li><li>00:03:28 - Professional Services in IT-OT Integration</li><li>00:05:37 - Contextualizing Security in the OT Environment</li><li>00:08:08 - Executive Leadership in OT Security Implementation</li><li>00:13:01 - Enhancing OT Security Through Workforce Development</li><li>00:17:21 - Future Outlook on OT Cybersecurity Trends</li><li>00:21:07 - Educational Resources for Advancing in OT Security</li><li>00:24:03 - Key Takeaways and Practical Tips in OT Security</li></ul><br/><p>Links And Resources:</p><ul><li>Danielle Jablanski(DJ) on <a href="https://www.linkedin.com/in/daniellejjablanski" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.nozominetworks.com/" rel="noopener noreferrer" target="_blank">Nozomi Networks</a></li><li><a href="https://www.atlanticcouncil.org/expert/danielle-jablanski/" rel="noopener noreferrer" target="_blank">Atlantic Council</a></li><li><a href="https://industrialcyber.co/author/daniellej/" rel="noopener noreferrer" target="_blank">Industrial Cyber</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/danielle-jablanski-on-the-role-of-education-regulation-and-innovation-in-ot-cybersecurity]]></link><guid isPermaLink="false">f167c9b1-2bab-422e-8075-9dd9e67a2a3a</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 19 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/fa7b85f9-9639-4bb7-a6db-9a2f76f285af/Danielle-Jablanski-Final.mp3" length="49646123" type="audio/mpeg"/><itunes:duration>25:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode></item><item><title>ICS Cybersecurity Knowns, Unknowns, and Actions to Take with Industry Expert &amp; S4 Founder Dale Peterson</title><itunes:title>ICS Cybersecurity Knowns, Unknowns, and Actions to Take with Industry Expert &amp; S4 Founder Dale Peterson</itunes:title><description><![CDATA[<p>Craig Duckworth is joined by Dale Peterson, an esteemed figure in Industrial Control System (ICS) security. They explore the intricate interplay between Information Technology and Operational Technology, shedding light on the evolving challenges in cybersecurity for industrial sectors. Dale, with his rich background from founding the S4 conference to pioneering cybersecurity innovations, imparts invaluable insights for those navigating the complex landscape of industrial digital security, making this episode a must-listen for anyone invested in the future of industrial cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: Craig Duckworth Welcomes Dale Peterson, ICS Security Expert</li><li>00:01:09 - Dale's Entry into Industrial Cybersecurity: Beginnings and Motivations</li><li>00:02:49 - Tracing the Transformation of Industrial Cybersecurity Over Time</li><li>00:03:53 - Addressing the Skills Gap in Industrial Cybersecurity</li><li>00:04:53 - Communicating Effectively in the World of Cybersecurity</li><li>00:06:10 - Delving Deeper into the Evolution of Industrial Cybersecurity</li><li>00:10:57 - The Critical Role of Metrics in Enhancing Cybersecurity</li><li>00:12:37 - Navigating Cybersecurity Regulations in Industrial Sectors</li><li>00:19:27 - The Genesis and Goals of the S4 Conference</li><li>00:25:25 - Expert Guidance for Thriving in Industrial Cybersecurity</li><li>00:28:58 - Wrapping Up: Key Takeaways and Conclusion</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://dale-peterson.com/" rel="noopener noreferrer" target="_blank">Website</a></li><li><a href="https://twitter.com/s4xnews" rel="noopener noreferrer" target="_blank">Twitter/X</a></li><li><a href="https://www.linkedin.com/in/dale-peterson-s4" rel="noopener noreferrer" target="_blank">LinkedIn</a>  </li><li><a href="https://dale-peterson.com/podcast-2/" rel="noopener noreferrer" target="_blank">Unsolicited Response Podcast</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth is joined by Dale Peterson, an esteemed figure in Industrial Control System (ICS) security. They explore the intricate interplay between Information Technology and Operational Technology, shedding light on the evolving challenges in cybersecurity for industrial sectors. Dale, with his rich background from founding the S4 conference to pioneering cybersecurity innovations, imparts invaluable insights for those navigating the complex landscape of industrial digital security, making this episode a must-listen for anyone invested in the future of industrial cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction: Craig Duckworth Welcomes Dale Peterson, ICS Security Expert</li><li>00:01:09 - Dale's Entry into Industrial Cybersecurity: Beginnings and Motivations</li><li>00:02:49 - Tracing the Transformation of Industrial Cybersecurity Over Time</li><li>00:03:53 - Addressing the Skills Gap in Industrial Cybersecurity</li><li>00:04:53 - Communicating Effectively in the World of Cybersecurity</li><li>00:06:10 - Delving Deeper into the Evolution of Industrial Cybersecurity</li><li>00:10:57 - The Critical Role of Metrics in Enhancing Cybersecurity</li><li>00:12:37 - Navigating Cybersecurity Regulations in Industrial Sectors</li><li>00:19:27 - The Genesis and Goals of the S4 Conference</li><li>00:25:25 - Expert Guidance for Thriving in Industrial Cybersecurity</li><li>00:28:58 - Wrapping Up: Key Takeaways and Conclusion</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://dale-peterson.com/" rel="noopener noreferrer" target="_blank">Website</a></li><li><a href="https://twitter.com/s4xnews" rel="noopener noreferrer" target="_blank">Twitter/X</a></li><li><a href="https://www.linkedin.com/in/dale-peterson-s4" rel="noopener noreferrer" target="_blank">LinkedIn</a>  </li><li><a href="https://dale-peterson.com/podcast-2/" rel="noopener noreferrer" target="_blank">Unsolicited Response Podcast</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts, YouTube, and Google Podcasts to leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/ics-security-what-we-know-what-we-dont-know-and-what-we-need-to-do-with-dale-peterson]]></link><guid isPermaLink="false">8a6ece8c-57ab-432d-a370-3f7989224c0e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 12 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dd1cb200-4289-4025-aaf2-62644e20091f/Dale-Peterson-Final.mp3" length="57425180" type="audio/mpeg"/><itunes:duration>29:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode></item><item><title>Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks</title><itunes:title>Unmasking Industrial Cybersecurity Threats and Solutions with Dave Purdy of TXOne Networks</itunes:title><description><![CDATA[<p>We delve into the intricate world of operational technology (OT) cybersecurity with industry expert Dave Purdy. With his extensive experience transitioning from IT to OT, Dave discusses the unique challenges and vulnerabilities in protecting critical infrastructure and industrial networks. He shares his insights on safeguarding legacy systems, the importance of specialized skill sets in OT cybersecurity, and the evolving threats in this space. This conversation provides a comprehensive look at the current state and future direction of cybersecurity in operational technology, offering valuable takeaways for professionals in this field.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to the World of OT Cybersecurity with Expert Dave Purdy</li><li>00:01:19 - Dave's Journey: Shifting Focus from IT to OT</li><li>00:02:54 - Exploring Unique Market Challenges in OT Cybersecurity</li><li>00:03:44 - Tackling the Complexities of Legacy Systems in Industrial Networks</li><li>00:05:04 - Cybersecurity: A Key Business Priority in the Digital Age</li><li>00:06:38 - The Influence of Cybersecurity on Industrial Insurance Policies</li><li>00:09:02 - Effective Strategies for Overcoming Cybersecurity Hurdles</li><li>00:14:33 - Tailoring Cybersecurity Solutions Across Various Industries</li><li>00:23:17 - Essential Tips for Organizations Embarking on Cybersecurity Initiatives</li><li>00:25:09 - Wrapping Up: Key Insights and Final Thoughts from Dave Purdy</li></ul><br/><p>Links And Resources:</p><ul><li>Dave Purdy on <a href="https://www.linkedin.com/in/david-purdy-623539116/" rel="noopener noreferrer" target="_blank">LinkedIn</a> </li><li><a href="https://www.txone.com/" rel="noopener noreferrer" target="_blank">TXOne Networks</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>We delve into the intricate world of operational technology (OT) cybersecurity with industry expert Dave Purdy. With his extensive experience transitioning from IT to OT, Dave discusses the unique challenges and vulnerabilities in protecting critical infrastructure and industrial networks. He shares his insights on safeguarding legacy systems, the importance of specialized skill sets in OT cybersecurity, and the evolving threats in this space. This conversation provides a comprehensive look at the current state and future direction of cybersecurity in operational technology, offering valuable takeaways for professionals in this field.</p><p>Chapters:</p><ul><li>00:00:00 - Introduction to the World of OT Cybersecurity with Expert Dave Purdy</li><li>00:01:19 - Dave's Journey: Shifting Focus from IT to OT</li><li>00:02:54 - Exploring Unique Market Challenges in OT Cybersecurity</li><li>00:03:44 - Tackling the Complexities of Legacy Systems in Industrial Networks</li><li>00:05:04 - Cybersecurity: A Key Business Priority in the Digital Age</li><li>00:06:38 - The Influence of Cybersecurity on Industrial Insurance Policies</li><li>00:09:02 - Effective Strategies for Overcoming Cybersecurity Hurdles</li><li>00:14:33 - Tailoring Cybersecurity Solutions Across Various Industries</li><li>00:23:17 - Essential Tips for Organizations Embarking on Cybersecurity Initiatives</li><li>00:25:09 - Wrapping Up: Key Insights and Final Thoughts from Dave Purdy</li></ul><br/><p>Links And Resources:</p><ul><li>Dave Purdy on <a href="https://www.linkedin.com/in/david-purdy-623539116/" rel="noopener noreferrer" target="_blank">LinkedIn</a> </li><li><a href="https://www.txone.com/" rel="noopener noreferrer" target="_blank">TXOne Networks</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/elevating-security-in-the-face-of-industrial-cybersecurity-risks-with-dave-purdy]]></link><guid isPermaLink="false">0146f06c-248a-4c64-bdd5-21b32e9ee619</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 05 Dec 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/185dfb7e-ad61-4703-aa74-fc424fc56ab5/Dave-Purdy-Final.mp3" length="50658421" type="audio/mpeg"/><itunes:duration>26:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode></item><item><title>Holidays &amp; Hackers: Keeping Industrial Control Systems Safe</title><itunes:title>Holidays &amp; Hackers: Keeping Industrial Control Systems Safe</itunes:title><description><![CDATA[<p>Dino Busalachi, CTO and co-founder, and Jim Cook, COO from Velta Technology, discuss the heightened risks of cybersecurity during the holiday season, especially in industrial environments. They explore how reduced staffing, increased remote access, and operational shutdowns create vulnerabilities in control systems. They dive into the importance of maintaining operational resilience and the necessity of robust cybersecurity measures. Practical advice and experiences are shared, emphasizing the need for preparedness and vigilance in safeguarding against cyber threats during this critical period.</p><p>Chapters:</p><ul><li>00:00:00 - Cybersecurity Challenges During the Holiday season</li><li>00:00:50 - Examining Cybersecurity Vulnerabilities During the Holiday Season</li><li>00:01:21 - Strategies for Effective Incident Response in Cybersecurity</li><li>00:02:19 - Analyzing Holiday Season Vulnerabilities in Control Systems</li><li>00:02:53 - Effect of Reduced Staffing on Cybersecurity During Holidays</li><li>00:04:54 - Supply Chain's Role in Ensuring Cybersecurity</li><li>00:06:39 - Preparing for Cyber Threats: Key Strategies and Tips</li><li>00:08:57 - Utilizing Advanced Tools and Technologies for Cybersecurity</li><li>00:11:20 - Identifying and Mitigating Cybersecurity Risks and Threats</li><li>00:15:01 - Importance of Continuous Monitoring in Cybersecurity</li><li>00:17:10 - Building Operational Resilience Against Cyber Threats</li><li>00:21:59 - Addressing Cybersecurity Issues: Admitting and Tackling Problems</li><li>00:24:40 - Wrapping Up: Key Takeaways and Final Thoughts on Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Dino Busalachi, CTO and co-founder, and Jim Cook, COO from Velta Technology, discuss the heightened risks of cybersecurity during the holiday season, especially in industrial environments. They explore how reduced staffing, increased remote access, and operational shutdowns create vulnerabilities in control systems. They dive into the importance of maintaining operational resilience and the necessity of robust cybersecurity measures. Practical advice and experiences are shared, emphasizing the need for preparedness and vigilance in safeguarding against cyber threats during this critical period.</p><p>Chapters:</p><ul><li>00:00:00 - Cybersecurity Challenges During the Holiday season</li><li>00:00:50 - Examining Cybersecurity Vulnerabilities During the Holiday Season</li><li>00:01:21 - Strategies for Effective Incident Response in Cybersecurity</li><li>00:02:19 - Analyzing Holiday Season Vulnerabilities in Control Systems</li><li>00:02:53 - Effect of Reduced Staffing on Cybersecurity During Holidays</li><li>00:04:54 - Supply Chain's Role in Ensuring Cybersecurity</li><li>00:06:39 - Preparing for Cyber Threats: Key Strategies and Tips</li><li>00:08:57 - Utilizing Advanced Tools and Technologies for Cybersecurity</li><li>00:11:20 - Identifying and Mitigating Cybersecurity Risks and Threats</li><li>00:15:01 - Importance of Continuous Monitoring in Cybersecurity</li><li>00:17:10 - Building Operational Resilience Against Cyber Threats</li><li>00:21:59 - Addressing Cybersecurity Issues: Admitting and Tackling Problems</li><li>00:24:40 - Wrapping Up: Key Takeaways and Final Thoughts on Cybersecurity</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/holidays-hackers-keeping-industrial-systems-safe]]></link><guid isPermaLink="false">ac7d8097-65a0-42c2-98d3-ecc970fc1aba</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 28 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/85f09f6a-fabb-4de6-8cb5-a24f5588c2da/Holidays-and-Hackers-Final.mp3" length="49881852" type="audio/mpeg"/><itunes:duration>25:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode></item><item><title>Cybersecurity Threats and Insurance Solutions with Rogan Dwyer</title><itunes:title>Cybersecurity Threats and Insurance Solutions with Rogan Dwyer</itunes:title><description><![CDATA[<p>Craig Duckworth engages with Rogan Dwyer, a seasoned expert in the insurance space, to unravel the complexities of cybersecurity insurance. Dwyer, with his extensive background in risk mitigation and insurance, delves into the evolving landscape of cyber threats and the insurance industry's response to these challenges. They discuss the necessity of integrating insurance with broader risk management strategies and the importance of board-level understanding and involvement in cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 – Diving Into the World of Cybersecurity Insurance</li><li>00:02:20 – Decoding Client Risks: A Critical Look at Policy Impacts</li><li>00:04:50 – The Hunt for Premium Clients: A Strategic Approach for Insurers</li><li>00:07:15 – The Future is Now: Innovations in Underwriting and Risk Mitigation</li><li>00:09:45 – Claims &amp; Onboarding: Mastering Efficiency in Insurance</li><li>00:12:20 – Leaders in the Limelight: Executive Roles in Cyber Insurance Decisions</li><li>00:14:55 – Navigating Financial Hurdles: Large Loss Recovery Tactics</li><li>00:18:40 – Boardroom Dynamics: Steering the Insurance Decision Course</li><li>00:22:25 – Risk Management SOS: Where to Turn for Expert Advice</li><li>00:23:40 – Cyber Risks and Corporate Strategies: An Insurance Perspective</li><li>00:24:55 – Building Bridges: Collaborative Efforts in Risk and Insurance</li><li>00:28:40 – Key Takeaways: The Essence of Today's Cyber Insurance Talk</li></ul><br/><p>Links And Resources:</p><ul><li>Rogan Dwyer on <a href="https://www.linkedin.com/in/rogandwyer" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.observatorystrategicmanagement.com/" rel="noopener noreferrer" target="_blank">Observatory Strategic Management</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Craig Duckworth engages with Rogan Dwyer, a seasoned expert in the insurance space, to unravel the complexities of cybersecurity insurance. Dwyer, with his extensive background in risk mitigation and insurance, delves into the evolving landscape of cyber threats and the insurance industry's response to these challenges. They discuss the necessity of integrating insurance with broader risk management strategies and the importance of board-level understanding and involvement in cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 – Diving Into the World of Cybersecurity Insurance</li><li>00:02:20 – Decoding Client Risks: A Critical Look at Policy Impacts</li><li>00:04:50 – The Hunt for Premium Clients: A Strategic Approach for Insurers</li><li>00:07:15 – The Future is Now: Innovations in Underwriting and Risk Mitigation</li><li>00:09:45 – Claims &amp; Onboarding: Mastering Efficiency in Insurance</li><li>00:12:20 – Leaders in the Limelight: Executive Roles in Cyber Insurance Decisions</li><li>00:14:55 – Navigating Financial Hurdles: Large Loss Recovery Tactics</li><li>00:18:40 – Boardroom Dynamics: Steering the Insurance Decision Course</li><li>00:22:25 – Risk Management SOS: Where to Turn for Expert Advice</li><li>00:23:40 – Cyber Risks and Corporate Strategies: An Insurance Perspective</li><li>00:24:55 – Building Bridges: Collaborative Efforts in Risk and Insurance</li><li>00:28:40 – Key Takeaways: The Essence of Today's Cyber Insurance Talk</li></ul><br/><p>Links And Resources:</p><ul><li>Rogan Dwyer on <a href="https://www.linkedin.com/in/rogandwyer" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li><a href="https://www.observatorystrategicmanagement.com/" rel="noopener noreferrer" target="_blank">Observatory Strategic Management</a></li><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-threats-and-insurance-solutions-with-rogan-dwyer]]></link><guid isPermaLink="false">4729c8fd-f4a5-4ddb-81e3-a63b46d23174</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 21 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/0616f995-6cc8-41a8-a765-b5ec7e9acfb1/Insurance-Industry-Final.mp3" length="72523328" type="audio/mpeg"/><itunes:duration>30:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode></item><item><title>Missteps and Common Blunders with Manufacturing, ICS and Cybersecurity</title><itunes:title>Missteps and Common Blunders with Manufacturing, ICS and Cybersecurity</itunes:title><description><![CDATA[<p>We delve into the complex world of cybersecurity in the industrial sector. Our experts, Dino Busalachi and Craig Duckworth, unpack the nuances of IT/OT convergence, the gaping holes in cybersecurity insurance, and the unique challenges faced by manufacturers across a diverse array of plants. They share firsthand experiences of cybersecurity incidents that have led to significant operational disruptions, highlighting the critical need for a robust security framework in the industrial control space. This conversation is a must-listen for anyone invested in the safeguarding of our industrial infrastructure for manufacturing and critical infrastructure organizations.</p><p>Chapters:</p><ul><li>00:00:00 - Exploring Industrial Cybersecurity: Insights into the Industrial Security Landscape</li><li>00:03:00 - Crisis Averted: Rescuing IP Addresses from a Denial of Service Attack</li><li>00:04:47 - Concerns Raised: Unauthorized Scanning of Control System Networks</li><li>00:07:30 - Costly Consequences: Duplicate IP Address Mishap in Automotive Manufacturing</li><li>00:10:27 - Managing Risks in Diverse Industrial Environments</li><li>00:12:00 - Cybersecurity Risks in Industrial Control Systems: Default Passwords on Plant Printers</li><li>00:14:03 - Firewall Limitations in the Realm of Industrial Cybersecurity</li><li>00:16:36 - Challenges in Handling Equipment and Software in Industrial Environments</li><li>00:20:22 - Bridging the Gap: Applying IT Practices to Operational Technology</li><li>00:22:56 - Recruiting Cybersecurity Talent for Industrial Control Systems: Challenges and Solutions</li><li>00:26:35 - Assigning Roles: The Importance of OT Cybersecurity in Industrial Facilities</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>We delve into the complex world of cybersecurity in the industrial sector. Our experts, Dino Busalachi and Craig Duckworth, unpack the nuances of IT/OT convergence, the gaping holes in cybersecurity insurance, and the unique challenges faced by manufacturers across a diverse array of plants. They share firsthand experiences of cybersecurity incidents that have led to significant operational disruptions, highlighting the critical need for a robust security framework in the industrial control space. This conversation is a must-listen for anyone invested in the safeguarding of our industrial infrastructure for manufacturing and critical infrastructure organizations.</p><p>Chapters:</p><ul><li>00:00:00 - Exploring Industrial Cybersecurity: Insights into the Industrial Security Landscape</li><li>00:03:00 - Crisis Averted: Rescuing IP Addresses from a Denial of Service Attack</li><li>00:04:47 - Concerns Raised: Unauthorized Scanning of Control System Networks</li><li>00:07:30 - Costly Consequences: Duplicate IP Address Mishap in Automotive Manufacturing</li><li>00:10:27 - Managing Risks in Diverse Industrial Environments</li><li>00:12:00 - Cybersecurity Risks in Industrial Control Systems: Default Passwords on Plant Printers</li><li>00:14:03 - Firewall Limitations in the Realm of Industrial Cybersecurity</li><li>00:16:36 - Challenges in Handling Equipment and Software in Industrial Environments</li><li>00:20:22 - Bridging the Gap: Applying IT Practices to Operational Technology</li><li>00:22:56 - Recruiting Cybersecurity Talent for Industrial Control Systems: Challenges and Solutions</li><li>00:26:35 - Assigning Roles: The Importance of OT Cybersecurity in Industrial Facilities</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/unplugging-the-myths-of-machinery-shutdown-and-cybersecurity]]></link><guid isPermaLink="false">a2593319-2902-4396-8d7c-3aabc74b2a4d</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 14 Nov 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/8fbf5105-0510-44a2-81cb-789adcb3fdc0/Ep-3-Dino-and-Craig.mp3" length="44261341" type="audio/mpeg"/><itunes:duration>30:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode></item><item><title>The Ins and Outs of Cybersecurity Talent for OT ICS Roles</title><itunes:title>The Ins and Outs of Cybersecurity Talent for OT ICS Roles</itunes:title><description><![CDATA[<p>We delve into the critical intersection of finding talent for operational technology and cybersecurity roles within industrial environments. Dino and Jim engage in a discussion about the urgent need for cyber talent for industrial environments including manufacturing and critical infrastructure environments. They explore the potential for a new breed of cyber ops roles, the current state of industrial cybersecurity educational offerings, and the importance of immersing yourself in industrial environments to truly understand and protect the plant floor. This episode is a must-listen for anyone invested in the future of industrial safety and cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 - Meet the Leadership Team at Velta Technology</li><li>00:03:57 - Closing the Gap: Collaborating Between IT and Engineering for Industrial Cybersecurity</li><li>00:07:32 - Prioritizing Safety and Work Environment in Industrial Operations</li><li>00:11:28 - Cybersecurity's Vital Role and the Demand for Technical Expertise</li><li>00:13:05 - Dispelling Myths and Confronting Challenges in Industrial Cybersecurity</li><li>00:16:16 - The Imperative for Cybersecurity Training and Education</li><li>00:20:42 - Enhancing Cybersecurity Measures and Data Management in Modern Machine Centers</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>We delve into the critical intersection of finding talent for operational technology and cybersecurity roles within industrial environments. Dino and Jim engage in a discussion about the urgent need for cyber talent for industrial environments including manufacturing and critical infrastructure environments. They explore the potential for a new breed of cyber ops roles, the current state of industrial cybersecurity educational offerings, and the importance of immersing yourself in industrial environments to truly understand and protect the plant floor. This episode is a must-listen for anyone invested in the future of industrial safety and cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 - Meet the Leadership Team at Velta Technology</li><li>00:03:57 - Closing the Gap: Collaborating Between IT and Engineering for Industrial Cybersecurity</li><li>00:07:32 - Prioritizing Safety and Work Environment in Industrial Operations</li><li>00:11:28 - Cybersecurity's Vital Role and the Demand for Technical Expertise</li><li>00:13:05 - Dispelling Myths and Confronting Challenges in Industrial Cybersecurity</li><li>00:16:16 - The Imperative for Cybersecurity Training and Education</li><li>00:20:42 - Enhancing Cybersecurity Measures and Data Management in Modern Machine Centers</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/operational-talent]]></link><guid isPermaLink="false">18ee40e6-b249-4b34-bbd1-8e819e15a45c</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Mon, 06 Nov 2023 09:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/f06cee13-b265-4a9a-b78f-6f2b07e190cb/Operational-Talent-Final.mp3" length="59898871" type="audio/mpeg"/><itunes:duration>24:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode></item><item><title>Cybersecurity Unveiled Through IT and OT Alignment</title><itunes:title>Cybersecurity Unveiled Through IT and OT Alignment</itunes:title><description><![CDATA[<p>Jim and Dino dive deep into the intricate world of IT and OT convergence, exploring the unseen challenges and silent variables that permeate the manufacturing floor. From the metaphorical porcupines of IT issues to the invisible activities within plant walls, the discussion unveils the criticality of aligning IT and OT for robust industrial control system security. They also navigate through the complexities of managing varied technologies across different plants, especially in the context of mergers and acquisitions, offering listeners a rare glimpse into the delicate balancing act of thinking globally while acting locally in manufacturing cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 Exploring IT and OT Convergence in Industrial Cybersecurity</li><li>00:04:37 Navigating Equipment Lifecycles: The IT and OT Dilemma</li><li>00:10:22 Behind Plant Walls: Understanding Network Connections in Manufacturing</li><li>00:12:45 Securing Industrial Controls: The Value of Dedicated OT Firewalls</li><li>00:16:32 Importance of focusing on all layers of the OSI Model</li><li>00:20:54 Decoding the Tech Enigma: Cybersecurity Governance and the C-Suite</li><li>00:21:44 The CFO Discovering Hidden Industrial Plant Floor Assets Story</li><li>00:23:25 The Cornerstone of Cybersecurity: Maintaining Accurate IT Inventory in Manufacturing</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts and Google Podcasts, and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Jim and Dino dive deep into the intricate world of IT and OT convergence, exploring the unseen challenges and silent variables that permeate the manufacturing floor. From the metaphorical porcupines of IT issues to the invisible activities within plant walls, the discussion unveils the criticality of aligning IT and OT for robust industrial control system security. They also navigate through the complexities of managing varied technologies across different plants, especially in the context of mergers and acquisitions, offering listeners a rare glimpse into the delicate balancing act of thinking globally while acting locally in manufacturing cybersecurity.</p><p>Chapters:</p><ul><li>00:00:00 Exploring IT and OT Convergence in Industrial Cybersecurity</li><li>00:04:37 Navigating Equipment Lifecycles: The IT and OT Dilemma</li><li>00:10:22 Behind Plant Walls: Understanding Network Connections in Manufacturing</li><li>00:12:45 Securing Industrial Controls: The Value of Dedicated OT Firewalls</li><li>00:16:32 Importance of focusing on all layers of the OSI Model</li><li>00:20:54 Decoding the Tech Enigma: Cybersecurity Governance and the C-Suite</li><li>00:21:44 The CFO Discovering Hidden Industrial Plant Floor Assets Story</li><li>00:23:25 The Cornerstone of Cybersecurity: Maintaining Accurate IT Inventory in Manufacturing</li></ul><br/><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Spotify, Apple Podcasts and Google Podcasts, and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/cybersecurity-unveiled-through-it-and-ot-alignment]]></link><guid isPermaLink="false">9637f510-c67a-4553-a754-d2e142f069be</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Tue, 31 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/653e96de-719d-4420-bd80-344b5bb6cc01/IT-vs-OT-Final-v2.mp3" length="68729304" type="audio/mpeg"/><itunes:duration>28:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode></item><item><title>Industrial Cybersecurity Insider Intro</title><itunes:title>Industrial Cybersecurity Insider Intro</itunes:title><description><![CDATA[<p>Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!</p><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></description><content:encoded><![CDATA[<p>Created by Velta Technology, 'Industrial Cybersecurity Insider' offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!</p><p>Links And Resources:</p><ul><li><a href="https://www.veltatech.com/" rel="noopener noreferrer" target="_blank">Velta Technology</a></li><li>Dino Busalachi on <a href="https://www.linkedin.com/in/dinobusalachi/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Jim Cook on <a href="https://www.linkedin.com/in/jamescook-1/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li><li>Craig Duckworth on <a href="https://www.linkedin.com/in/craigaduckworth/" rel="noopener noreferrer" target="_blank">LinkedIn</a></li></ul><br/><p>Thanks so much for joining us this week. Want to subscribe to <em>Industrial Cybersecurity Insider</em>? Have some feedback you’d like to share? Connect with us on Apple Podcasts and leave us a review!</p>]]></content:encoded><link><![CDATA[https://industrial-cybersecurity-insider.captivate.fm/episode/industrial-cybersecurity-insider-intro]]></link><guid isPermaLink="false">8874baee-2d85-4aac-bb65-ad06fc17961e</guid><itunes:image href="https://artwork.captivate.fm/0aa68a5e-e359-4f46-8dc6-efc670770c88/sXSSVT41v5xMTl8Yzj1_UUUW.jpg"/><pubDate>Mon, 09 Oct 2023 04:00:00 -0700</pubDate><enclosure url="https://podcasts.captivate.fm/media/dd6b387c-84ae-4e04-b36a-d75613134653/0912-Intro-v2.mp3" length="1714773" type="audio/mpeg"/><itunes:duration>00:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType></item></channel></rss>